CVE-2016-1905
server: patch operation should use patched object to check admission control
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.
El servidor API en Kubernetes no comprueba correctamente el control de admisión, lo que permite a usuarios remotos autenticados acceder a recursos adicionales a través de un objeto parcheado manipulado.
An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain requests. An authenticated remote attacker could use this flaw to gain additional access to resources such as RAM and disk space.
OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain requests. An authenticated remote attacker could use this flaw to gain additional access to resources such as RAM and disk space. An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain build configuration strategies. A remote attacker could create build configurations with strategies that violate policy. Although the attacker could not launch the build themselves, if the build configuration files were later launched by other privileged services, user privileges could be bypassed allowing attacker escalation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-01-14 CVE Reserved
- 2016-01-27 CVE Published
- 2024-08-05 CVE Updated
- 2025-04-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
- CWE-285: Improper Authorization
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/kubernetes/kubernetes/issues/19479 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2016:0070 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2016-1905 | 2016-03-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1297910 | 2016-03-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kubernetes Search vendor "Kubernetes" | Kubernetes Search vendor "Kubernetes" for product "Kubernetes" | - | - |
Affected
|