Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02cGN2LXFxeDQtbXhtM84AARRw
Minikube RCE via DNS Rebinding
In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.
Permalink: https://github.com/advisories/GHSA-6pcv-qqx4-mxm3JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02cGN2LXFxeDQtbXhtM84AARRw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 10 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-6pcv-qqx4-mxm3, CVE-2018-1002103
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1002103
- https://github.com/kubernetes/minikube/issues/3208
- https://github.com/advisories/GHSA-6pcv-qqx4-mxm3
Blast Radius: 5.3
Affected Packages
go:k8s.io/minikube
Dependent packages: 2Dependent repositories: 4
Downloads:
Affected Version Ranges: >= 0.3.0, <= 0.29.0
No known fixed version
All affected versions: 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.7.0, 0.7.1, 0.8.0, 0.9.0, 0.10.0, 0.11.0, 0.12.0, 0.12.1, 0.12.2, 0.13.0, 0.13.1, 0.14.0, 0.15.0, 0.16.0, 0.17.0, 0.17.1, 0.18.0, 0.19.0, 0.19.1, 0.20.0, 0.21.0, 0.22.0, 0.22.1, 0.22.2, 0.22.3, 0.23.0, 0.24.0, 0.24.1, 0.25.0, 0.25.1, 0.25.2, 0.26.0, 0.26.1, 0.27.0, 0.28.0, 0.28.1, 0.28.2, 0.29.0