CVE-2019-11244
kubectl creates world-writeable cached schema files
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.
En Kubernetes versión 1.8.x hasta versión 1.14.x, el componente kubectl almacena en caché la información del esquema en la ubicación especificada por --cache-dir (defaulting to $HOME/.kube/http-cache), escrita con permisos world-writeable (rw-rw-rw-). Si se especifica --cache-dir y se apunta a una ubicación distinta accesible para otros usuarios o grupos, los archivos escritos pueden ser modificados por otros usuarios o grupos e interrumpir la invocación de Kubectl.
A flaw was found in kubectl that leaves http-cache files with read/write permissions for any user. In conjunction with a non-default value for --cache-dir, this may lead to the cache content being placed in a location accessible to other users on the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-17 CVE Reserved
- 2019-04-22 CVE Published
- 2024-04-15 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-524: Use of Cache Containing Sensitive Information
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/108064 | Third Party Advisory | |
https://github.com/kubernetes/kubernetes/issues/76676 | Third Party Advisory | |
https://security.netapp.com/advisory/ntap-20190509-0002 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:3942 | 2020-10-02 | |
https://access.redhat.com/errata/RHSA-2020:0020 | 2020-10-02 | |
https://access.redhat.com/errata/RHSA-2020:0074 | 2020-10-02 | |
https://access.redhat.com/security/cve/CVE-2019-11244 | 2020-01-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1703209 | 2020-01-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kubernetes Search vendor "Kubernetes" | Kubernetes Search vendor "Kubernetes" for product "Kubernetes" | >= 1.8.0 <= 1.14.1 Search vendor "Kubernetes" for product "Kubernetes" and version " >= 1.8.0 <= 1.14.1" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Trident Search vendor "Netapp" for product "Trident" | - | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Container Platform Search vendor "Redhat" for product "Openshift Container Platform" | 3.11 Search vendor "Redhat" for product "Openshift Container Platform" and version "3.11" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Container Platform Search vendor "Redhat" for product "Openshift Container Platform" | 4.1 Search vendor "Redhat" for product "Openshift Container Platform" and version "4.1" | - |
Affected
|