CVE-2023-51774 Affecting kube-fluentd-operator package, versions <1.18.2-r3
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-KUBEFLUENTDOPERATOR-6422174
- published 12 Mar 2024
- disclosed 29 Feb 2024
Introduced: 29 Feb 2024
CVE-2023-51774 Open this link in a new tabHow to fix?
Upgrade Wolfi
kube-fluentd-operator
to version 1.18.2-r3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kube-fluentd-operator
package and not the kube-fluentd-operator
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode.