An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-1260 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2176267 | Issue Tracking Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:4312 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:4093 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:3976 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:4898 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20231020-0010/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2023-09-24 01:15
Updated : 2023-12-15 18:19
NVD link : CVE-2023-1260
Mitre link : CVE-2023-1260
JSON object : View
Products Affected
redhat
- openshift_container_platform
kubernetes
- kube-apiserver
CWE
