Integrity Violation Affecting k8s.io/kubernetes/plugin/pkg/admission/serviceaccount package, versions <1.27.13>=1.28.0 <1.28.9>=1.29.0 <1.29.4


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-K8SIOKUBERNETESPLUGINPKGADMISSIONSERVICEACCOUNT-6619751
  • published18 Apr 2024
  • disclosed16 Apr 2024
  • credittha3e1vl

Introduced: 16 Apr 2024

CVE-2024-3177  (opens in a new tab)
CWE-213  (opens in a new tab)

How to fix?

Upgrade k8s.io/kubernetes/plugin/pkg/admission/serviceaccount to version 1.27.13, 1.28.9, 1.29.4 or higher.

Overview

Affected versions of this package are vulnerable to Integrity Violation due to a flaw in the kube-apiserver. Authenticated users are able to launch containers that circumvent the mountable secrets policy enforced by the ServiceAccount admission plugin.

Notes:

Clusters are impacted by this vulnerability if all of the following are true:

  1. The ServiceAccount admission plugin is used. Most cluster should have this on by default as recommended in the docs

  2. The kubernetes.io/enforce-mountable-secrets 3 annotation is used by a service account. This annotation is not added by default.

  3. Pods using containers, init containers, and ephemeral containers with the envFrom field populated.

CVSS Scores

version 3.1