CVE-2018-1002105

Scores

EPSS

0.907high90.7%
0%20%40%60%80%100%

Percentile: 90.7%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-305CWE-388

Related Vulnerabilities

Exploits

Exploit ID: 46052

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46052

Exploit ID: 46053

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46053

Exploit ID: CVE-2018-1002105

Source: github-poc

URL: https://github.com/sh-ubh/CVE-2018-1002105

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3754

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3752

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3624

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3598

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3551

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3549

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:3537

Vulnerable Software (49)

Type: Configuration

Product: atomic-enterprise-service-catalog

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.1450.7d3f435.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.0.3cb2fdc.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.11.43-1.git.0.647ac05.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.2.1.34-2.git.20.6367d5d.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.3.1.46.45-1.git.0.2ce596e.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.4.1.44.57-1.git.0.a631031.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.5.5.31.80-1.git.0.c4a0780.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.6.173.0.140-1.git.0.9686d52.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.7.72-1.git.0.925b9cd.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.8.44-1.git.0.9be0abd.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift

Operating System: rhel

Trait:
{  "fixed": "3.9.51-1.git.0.dc3a40b.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift-descheduler

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.299.953c1c8.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift-dockerregistry

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.390.186ec4f.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift-node-problem-detector

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.252.fa9e8ae.el7"}

Source: redhat

Type: Configuration

Product: atomic-openshift-web-console

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.395.d23c438.el7"}

Source: redhat

Type: Configuration

Product: cockpit

Operating System: rhel

Trait:
{  "fixed": "160-3.el7"}

Source: redhat

Type: Configuration

Product: golang-github-prometheus-node_exporter

Operating System: rhel

Trait:
{  "fixed": "3.10.72-1.git.1060.64daa26.el7"}

Source: redhat

Type: Configuration

Product: kubernetes

Operating System: ubuntu cosmic 18.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: kubernetes

Operating System: ubuntu disco 19.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: kubernetes

Operating System: ubuntu eoan 19.10

Trait:
{  "unfixed": true}

Source: ubuntu