Moderate severityNVD Advisory· Published Sep 20, 2021· Updated Sep 16, 2024
Webhook redirect in kube-apiserver
CVE-2020-8561
Description
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
k8s.io/kubernetesGo | <= 1.22.2 | — |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-74j8-88mm-7496ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-8561ghsaADVISORY
- github.com/kubernetes/kubernetes/issues/104720ghsax_refsource_MISCWEB
- groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsYghsax_refsource_MISCWEB
- security.netapp.com/advisory/ntap-20211014-0002ghsaWEB
- security.netapp.com/advisory/ntap-20211014-0002/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.