Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nOGZjLXZyY2ctOHZqZ84AA7BP
Constallation has pods exposed to peers in VPC
Impact
Cilium allows outside actors (world
entity) to directly access pods with their internal pod IP, even if they are not exposed explicitly (e.g. via LoadBalancer
). A pod that does not authenticate clients and that does not exclude world
traffic via network policy may leak sensitive data to an attacker inside the cloud VPC.
Patches
The issue has been patched in v2.16.3.
Workarounds
This network policy excludes all world
traffic. It mitigates the problem, but will also block all desired external traffic. If vulnerable pods are known, a policy can be crafted to only firewall those instead (see also https://docs.cilium.io/en/stable/security/policy/language/#access-to-from-outside-cluster).
apiVersion: "cilium.io/v2"
kind: CiliumClusterwideNetworkPolicy
metadata:
name: "from-world-to-role-public"
spec:
endpointSelector:
matchLabels: {}
# role: public
ingressDeny:
- fromEntities:
- world
References
The tracking bug for a Cilium-side fix is https://github.com/cilium/cilium/issues/25626.
Permalink: https://github.com/advisories/GHSA-g8fc-vrcg-8vjgJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nOGZjLXZyY2ctOHZqZ84AA7BP
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 7 months ago
Updated: 6 months ago
Identifiers: GHSA-g8fc-vrcg-8vjg
References:
- https://github.com/edgelesssys/constellation/security/advisories/GHSA-g8fc-vrcg-8vjg
- https://github.com/cilium/cilium/issues/25626
- https://pkg.go.dev/vuln/GO-2024-2727
- https://github.com/advisories/GHSA-g8fc-vrcg-8vjg
Blast Radius: 0.0
Affected Packages
go:github.com/edgelesssys/constellation/v2
Dependent packages: 3Dependent repositories: 1
Downloads:
Affected Version Ranges: < 2.16.3
Fixed in: 2.16.3
All affected versions: 2.0.0, 2.1.0, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.4.0, 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.6.0, 2.7.0, 2.7.1, 2.8.0, 2.9.0, 2.9.1, 2.10.0, 2.10.1, 2.11.0, 2.12.0, 2.13.0, 2.14.0, 2.14.1, 2.14.2, 2.14.3, 2.15.0, 2.15.1, 2.16.0, 2.16.1, 2.16.2
All unaffected versions: 2.16.3, 2.16.4, 2.17.0, 2.18.0, 2.19.0