Skip to content

Command Injection for Kubernets Connection

Moderate
ibuler published GHSA-6x5p-jm59-jh29 Mar 16, 2023

Package

koko (Internal Compoent)

Affected versions

<2.28.7

Patched versions

2.28.8

Description

Impact

Command Injection for Kubernets Connection

Using illegal tokens to connect to a Kubernetes cluster through Koko can result in the execution of dangerous commands that may disrupt the Koko container environment and affect normal usage

Details

  1. Create an example of an illegal Kubernetes token like the one shown below:
;touch /tmp/hackeme;
  1. If the token is used to connect to a Kubernetes cluster, any commands executed using the token - such as touch /tmp/hackeme - will create a file at /tmp/hackeme.

Patches

The vulnerability has been fixed in v2.28.8

Workarounds

It is recommended to upgrade the version to v2.28.8

References

Found by 长亭科技(Chaitin Tech)

Severity

Moderate
5.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H

CVE ID

CVE-2023-28110

Weaknesses

No CWEs

Credits