-
Notifications
You must be signed in to change notification settings - Fork 38.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-2727, CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin #118640
Comments
|
please describe the issue |
|
/triage needs-information |
[You have to place prow commands in a new comment, it ignores comment edit events when looking for slash commands to avoid unintentionally triggering them on comment edits] |
|
@tamilselvan1102 it is standard practice in Kubernetes that private security issues start as a placeholder issue with no details until the patch is released and the details are later edited in. They usually just say "placeholder issue" filed by an organization member. |
|
@BenTheElder |
|
nit: it would be nice to acknowledge the issue reporter. |
|
Updated |
|
/retitle CVE-2023-2727,CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin (To fix this issue kubernetes/website#47003 in RSS CVE feed by removing space after comma) |
|
/retitle CVE-2023-2727, CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin (Resetting back to original as kubernetes/website#47003 is now fixed and accepts any number of spaces before and after comma) |
CVE-2023-2727: Bypassing policies imposed by the ImagePolicyWebhook admission plugin
CVSS Rating: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
A security issue was discovered in Kubernetes where users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
Am I vulnerable?
Clusters are impacted by this vulnerability if all of the following are true:
Affected Versions
How do I mitigate this vulnerability?
This issue can be mitigated by applying the patch provided for the kube-apiserver component. This patch prevents ephemeral containers from using an image that is restricted by ImagePolicyWebhook.
Note: Validation webhooks (such as Gatekeeper and Kyverno) can also be used to enforce the same restrictions.
Fixed Versions
Detection
Pod update requests using an ephemeral container with an image that should have been restricted by an ImagePolicyWebhook will be captured in API audit logs. You can also use
kubectl get podsto find active pods with ephemeral containers running an image that should have been restricted in your cluster with this issue.Acknowledgements
This vulnerability was reported by Stanislav Láznička, and fixed by Rita Zhang.
CVE-2023-2728: Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin
CVSS Rating: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the
kubernetes.io/enforce-mountable-secretsannotation are used together with ephemeral containers.Am I vulnerable?
Clusters are impacted by this vulnerability if all of the following are true:
kubernetes.io/enforce-mountable-secretsannotation is used by a service account. This annotation is not added by default.Affected Versions
How do I mitigate this vulnerability?
This issue can be mitigated by applying the patch provided for the kube-apiserver component. The patch prevents ephemeral containers from bypassing the mountable secrets policy enforced by the ServiceAccount admission plugin.
Fixed Versions
Detection
Pod update requests using an ephemeral container that exploits this vulnerability with unintended secret will be captured in API audit logs. You can also use kubectl get pods to find active pods with ephemeral containers running with a secret that is not referenced by the service account in your cluster.
Acknowledgements
This vulnerability was reported by Rita Zhang, and fixed by Rita Zhang.
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
/area security
/kind bug
/committee security-response
/label official-cve-feed
/sig auth
/area apiserver
The text was updated successfully, but these errors were encountered: