// For flags

CVE-2022-31098

Weave GitOps leaked cluster credentials into logs on connection errors

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, including the service account tokens in plain text from Weave GitOps's pod logs on the management cluster. An unauthorized remote attacker can also view these sensitive configurations from external log storage if enabled by the management cluster. This vulnerability is due to the client factory dumping cluster configurations and their service account tokens when the cluster manager tries to connect to an API server of a registered cluster, and a connection error occurs. An attacker could exploit this vulnerability by either accessing logs of a pod of Weave GitOps, or from external log storage and obtaining all cluster configurations of registered clusters. A successful exploit could allow the attacker to use those cluster configurations to manage the registered Kubernetes clusters. This vulnerability has been fixed by commit 567356f471353fb5c676c77f5abc2a04631d50ca. Users should upgrade to Weave GitOps core version v0.8.1-rc.6 or newer. There is no known workaround for this vulnerability.

Weave GitOps es una sencilla plataforma de código abierto para desarrolladores que quieren aplicaciones nativas en la nube, sin necesidad de tener conocimientos de Kubernetes. Una vulnerabilidad en el registro de Weave GitOps podría permitir a un atacante remoto autenticado visualizar las configuraciones confidenciales del clúster, también conocido como KubeConfg, de los clústeres Kubernetes registrados, incluyendo los tokens de la cuenta de servicio en texto plano desde los registros de pods de Weave GitOps en el clúster de administración. Un atacante remoto no autorizado también puede visualizar estas configuraciones confidenciales desde el almacenamiento de registros externos si el clúster de administración lo permite. Esta vulnerabilidad es debido a que la fábrica de clientes vuelca las configuraciones del clúster y sus tokens de cuentas de servicio cuando el administrador del clúster intenta conectarse a un servidor API de un clúster registrado, y es producido un error de conexión. Un atacante podría explotar esta vulnerabilidad al acceder a los logs de un pod de Weave GitOps, o desde un almacenamiento de logs externo y obteniendo todas las configuraciones de cluster de los clusters registrados. Una explotación con éxito podría permitir al atacante usar esas configuraciones de clúster para administrar los clústeres Kubernetes registrados. Esta vulnerabilidad ha sido corregida por el commit 567356f471353fb5c676c77f5abc2a04631d50ca. Los usuarios deben actualizar a versión core de Weave GitOps versiones v0.8.1-rc.6 o más reciente. No se conoce ninguna mitigación para esta vulnerabilidad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-06-27 CVE Published
  • 2024-06-11 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-532: Insertion of Sensitive Information into Log File
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Weave
Search vendor "Weave"
Weave Gitops
Search vendor "Weave" for product "Weave Gitops"
< 0.8.1
Search vendor "Weave" for product "Weave Gitops" and version " < 0.8.1"
-
Affected
Weave
Search vendor "Weave"
Weave Gitops
Search vendor "Weave" for product "Weave Gitops"
0.8.1
Search vendor "Weave" for product "Weave Gitops" and version "0.8.1"
rc1
Affected
Weave
Search vendor "Weave"
Weave Gitops
Search vendor "Weave" for product "Weave Gitops"
0.8.1
Search vendor "Weave" for product "Weave Gitops" and version "0.8.1"
rc2
Affected
Weave
Search vendor "Weave"
Weave Gitops
Search vendor "Weave" for product "Weave Gitops"
0.8.1
Search vendor "Weave" for product "Weave Gitops" and version "0.8.1"
rc3
Affected
Weave
Search vendor "Weave"
Weave Gitops
Search vendor "Weave" for product "Weave Gitops"
0.8.1
Search vendor "Weave" for product "Weave Gitops" and version "0.8.1"
rc4
Affected
Weave
Search vendor "Weave"
Weave Gitops
Search vendor "Weave" for product "Weave Gitops"
0.8.1
Search vendor "Weave" for product "Weave Gitops" and version "0.8.1"
rc5
Affected