// For flags

CVE-2021-43832

Improper Access Control in spinnaker

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Spinnaker is an open source, multi-cloud continuous delivery platform. Spinnaker has improper permissions allowing pipeline creation & execution. This lets an arbitrary user with access to the gate endpoint to create a pipeline and execute it without authentication. If users haven't setup Role-based access control (RBAC) with-in spinnaker, this enables remote execution and access to deploy almost any resources on any account. Patches are available on the latest releases of the supported branches and users are advised to upgrade as soon as possible. Users unable to upgrade should enable RBAC on ALL accounts and applications. This mitigates the ability of a pipeline to affect any accounts. Block application access unless permission are enabled. Users should make sure ALL application creation is restricted via appropriate wildcards.

Spinnaker es una plataforma de entrega continua multi-nube de código abierto. Spinnaker presenta permisos inapropiados que permiten la creación y ejecución de canalizaciones. Esto permite que un usuario arbitrario con acceso al endpoint de la puerta cree una canalización y la ejecute sin autenticación. Si los usuarios no han configurado el control de acceso basado en roles (RBAC) en Spinnaker, esto permite la ejecución remota y el acceso para desplegar casi cualquier recurso en cualquier cuenta. Los parches están disponibles en las últimas versiones de las ramas soportadas y se recomienda a usuarios que actualicen lo antes posible. Los usuarios que no puedan actualizar deberían habilitar RBAC en TODAS las cuentas y aplicaciones. Esto mitiga la capacidad de una tubería para afectar a cualquier cuenta. Bloquee el acceso a las aplicaciones a menos que los permisos estén habilitados. Los usuarios deben asegurarse de que TODA la creación de aplicaciones está restringida por medio de los comodines apropiados

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-11-16 CVE Reserved
  • 2022-01-04 CVE Published
  • 2024-08-04 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-306: Missing Authentication for Critical Function
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Spinnaker
Search vendor "Linuxfoundation" for product "Spinnaker"
< 1.25.8
Search vendor "Linuxfoundation" for product "Spinnaker" and version " < 1.25.8"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Spinnaker
Search vendor "Linuxfoundation" for product "Spinnaker"
>= 1.26.0 < 1.26.7
Search vendor "Linuxfoundation" for product "Spinnaker" and version " >= 1.26.0 < 1.26.7"
-
Affected