// For flags

CVE-2020-11710

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. “1) Inaccurate Bug Scope - The issue scope was on Kong's docker-compose template, and not Kong's docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating ‘An issue was discovered in docker-kong (for Kong) through 2.0.3.’ is incorrect. This issue only occurs if a user decided to spin up Kong via docker-compose without following the security documentation. The docker-compose template is meant for users to quickly get started with Kong, and is meant for development purposes only. 2) Incorrect Patch Links - The CVE currently points to a documentation improvement as a “Patch” link: https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611.This link actually points to an improvement Kong Inc made for fool-proofing. However, instructions for how to protect the admin API were already well-documented here: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions , which was first published back in 2017 (as shown in this commit: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Lastly, the hyperlink to https://github.com/Kong/kong (an unrelated Github Repo to this issue) on the Hyperlink list does not include any meaningful information on this topic.

** EN DISPUTA ** Se descubrió un problema en docker-kong (para Kong) hasta la versión 2.0.3. El puerto API de administrador puede ser accesible en interfaces que no sean 127.0.0.1. NOTA: El proveedor argumenta que este CVE no es una vulnerabilidad porque tiene un alcance de error y enlaces de parche imprecisos. “1) Alcance de error inexacto: el alcance del problema estaba en la plantilla de compilación de acoplador de Kong, y no en la imagen de acoplador de Kong en sí. En realidad, este problema no está asociado con ninguna versión de la puerta de enlace Kong. Como tal, la descripción que indica "Se descubrió un problema en docker-kong (para Kong) a través de 2.0.3." Es incorrecta. Este problema solo ocurre si un usuario decidió girar Kong a través de Docker-compose sin seguir la documentación de seguridad. La plantilla Docker-compose está diseñada para que los usuarios comiencen rápidamente con Kong, y solo para fines de desarrollo. 2) Enlaces de parches incorrectos: el CVE actualmente apunta a una mejora de la documentación como un enlace de "Parche": https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611 Este enlace en realidad apunta a una mejora que Kong Inc hizo para la prueba de tontos. Sin embargo, las instrucciones sobre cómo proteger la API de administración ya estaban bien documentadas aquí: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions, que se publicó por primera vez en 2017 (como se muestra en esta confirmación: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Por último, el hipervínculo a https://github.com/Kong/kong (un repositorio de Github no relacionado con este problema) en la lista de hipervínculos no incluye ninguna información significativa sobre este tema ".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-04-12 CVE Reserved
  • 2020-04-12 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-10-24 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Konghq
Search vendor "Konghq"
Docker-kong
Search vendor "Konghq" for product "Docker-kong"
<= 2.0.3
Search vendor "Konghq" for product "Docker-kong" and version " <= 2.0.3"
kong
Affected