Moderate severityNVD Advisory· Published Jul 3, 2023· Updated Feb 13, 2025
Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin
CVE-2023-2728
Description
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with ephemeral containers.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
k8s.io/kubernetesGo | >= 1.27.0, < 1.27.3 | 1.27.3 |
k8s.io/kubernetesGo | >= 1.26.0, < 1.26.6 | 1.26.6 |
k8s.io/kubernetesGo | >= 1.25.0, < 1.25.11 | 1.25.11 |
k8s.io/kubernetesGo | < 1.24.15 | 1.24.15 |
Affected products
1- Range: v1.24.14
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- github.com/advisories/GHSA-cgcv-5272-97prghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-2728ghsaADVISORY
- www.openwall.com/lists/oss-security/2023/07/06/3ghsaWEB
- github.com/kubernetes/kubernetes/issues/118640ghsaissue-trackingWEB
- github.com/kubernetes/kubernetes/pull/118356ghsaWEB
- github.com/kubernetes/kubernetes/pull/118471ghsaWEB
- github.com/kubernetes/kubernetes/pull/118473ghsaWEB
- github.com/kubernetes/kubernetes/pull/118474ghsaWEB
- github.com/kubernetes/kubernetes/pull/118512ghsaWEB
- groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8ghsamailing-listWEB
- security.netapp.com/advisory/ntap-20230803-0004ghsaWEB
- security.netapp.com/advisory/ntap-20230803-0004/mitre
News mentions
0No linked articles in our index yet.