Moderate severityNVD Advisory· Published Mar 1, 2023· Updated Mar 7, 2025
Unauthorized read of Custom Resources
CVE-2022-3162
Description
Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/kubernetes/kubernetesGo | >= 1.25.0, < 1.25.4 | 1.25.4 |
github.com/kubernetes/kubernetesGo | >= 1.24.0, < 1.24.8 | 1.24.8 |
github.com/kubernetes/kubernetesGo | >= 1.23.0, < 1.23.14 | 1.23.14 |
github.com/kubernetes/kubernetesGo | >= 1.22.0, < 1.22.16 | 1.22.16 |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-2394-5535-8j88ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-3162ghsaADVISORY
- github.com/kubernetes/kubernetes/issues/113756ghsaWEB
- groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjAghsaWEB
- security.netapp.com/advisory/ntap-20230511-0004ghsaWEB
- security.netapp.com/advisory/ntap-20230511-0004/mitre
News mentions
0No linked articles in our index yet.