// For flags

CVE-2022-24829

Missing authentication in Garden

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.

Garden es una plataforma de automatización para el desarrollo y las pruebas de Kubernetes. En las versiones anteriores a la 0.12.39 los endpoints múltiples no requerían autenticación. En algunos modos de funcionamiento esto permite a un atacante conseguir acceso a la aplicación de forma errónea. La configuración es filtrada mediante el endpoint /api en el servidor local que es encargado de servir el dashboard de Garden. En este momento, este servidor es accesible a 0.0.0.0 lo que lo hace accesible a cualquier persona en la misma red (o cualquier persona en Internet si está en una IP pública y estática). Esto puede conllevar a una posibilidad de comprometer credenciales, secretos o variables de entorno. Es recomendado a usuarios actualizar a versión 0.12.39 lo antes posible. Los usuarios que no puedan actualizar deberán usar un firewall que bloquee el acceso al puerto 9777 desde todas las máquinas de la red que no sean confiables

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-10 CVE Reserved
  • 2022-04-11 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-12-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Garden
Search vendor "Garden"
Garden
Search vendor "Garden" for product "Garden"
< 0.12.39
Search vendor "Garden" for product "Garden" and version " < 0.12.39"
kubernetes
Affected