VYPR
Moderate severityNVD Advisory· Published Dec 7, 2020· Updated Sep 17, 2024

Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9

CVE-2020-8565

Description

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
k8s.io/client-goGo
>= 0.19.0, < 0.19.60.19.6
k8s.io/client-goGo
>= 0.20.0-alpha.0, < 0.20.0-alpha.20.20.0-alpha.2
k8s.io/client-goGo
>= 0.18.0, < 0.18.140.18.14
k8s.io/client-goGo
< 0.17.160.17.16
k8s.io/kubernetesGo
< 1.20.0-alpha.21.20.0-alpha.2

Affected products

1

Patches

5
e99df0e5a75e

Merge pull request #95316 from sfowl/mask-token-in-toCurl

https://github.com/kubernetes/kubernetesKubernetes Prow RobotOct 7, 2020via ghsa
1 file changed · +1 0
  • staging/src/k8s.io/client-go/transport/round_trippers.go+1 0 modified
    @@ -340,6 +340,7 @@ func (r *requestInfo) toCurl() string {
     	headers := ""
     	for key, values := range r.RequestHeaders {
     		for _, value := range values {
    +			value = maskValue(key, value)
     			headers += fmt.Sprintf(` -H %q`, fmt.Sprintf("%s: %s", key, value))
     		}
     	}
    
1b8383fc150c

Mask bearer token in logs when logLevel >= 9

https://github.com/kubernetes/client-goSam FowlerOct 6, 2020via ghsa
1 file changed · +1 0
  • transport/round_trippers.go+1 0 modified
    @@ -340,6 +340,7 @@ func (r *requestInfo) toCurl() string {
     	headers := ""
     	for key, values := range r.RequestHeaders {
     		for _, value := range values {
    +			value = maskValue(key, value)
     			headers += fmt.Sprintf(` -H %q`, fmt.Sprintf("%s: %s", key, value))
     		}
     	}
    
44e1a07f2d51

Mask bearer token in logs when logLevel >= 9

https://github.com/kubernetes/client-goSam FowlerOct 6, 2020via ghsa
1 file changed · +1 0
  • transport/round_trippers.go+1 0 modified
    @@ -340,6 +340,7 @@ func (r *requestInfo) toCurl() string {
     	headers := ""
     	for key, values := range r.RequestHeaders {
     		for _, value := range values {
    +			value = maskValue(key, value)
     			headers += fmt.Sprintf(` -H %q`, fmt.Sprintf("%s: %s", key, value))
     		}
     	}
    
e8f871a2e5fa

Mask bearer token in logs when logLevel >= 9

https://github.com/kubernetes/client-goSam FowlerOct 6, 2020via ghsa
1 file changed · +1 0
  • transport/round_trippers.go+1 0 modified
    @@ -340,6 +340,7 @@ func (r *requestInfo) toCurl() string {
     	headers := ""
     	for key, values := range r.RequestHeaders {
     		for _, value := range values {
    +			value = maskValue(key, value)
     			headers += fmt.Sprintf(` -H %q`, fmt.Sprintf("%s: %s", key, value))
     		}
     	}
    
19875a3d5a2e

Mask bearer token in logs when logLevel >= 9

https://github.com/kubernetes/client-goSam FowlerOct 6, 2020via ghsa
1 file changed · +1 0
  • transport/round_trippers.go+1 0 modified
    @@ -340,6 +340,7 @@ func (r *requestInfo) toCurl() string {
     	headers := ""
     	for key, values := range r.RequestHeaders {
     		for _, value := range values {
    +			value = maskValue(key, value)
     			headers += fmt.Sprintf(` -H %q`, fmt.Sprintf("%s: %s", key, value))
     		}
     	}
    

Vulnerability mechanics

Synthesis attempt was rejected by the grounding validator. Re-run pending.

References

11

News mentions

0

No linked articles in our index yet.