Vulnerability Details : CVE-2023-30617
Kruise provides automated management of large-scale applications on Kubernetes. Starting in version 0.8.0 and prior to versions 1.3.1, 1.4.1, and 1.5.2, an attacker who has gained root privilege of the node that kruise-daemon run can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, the attacker can leverage the "captured" secrets (e.g. the kruise-manager service account token) to gain extra privileges such as pod modification. Versions 1.3.1, 1.4.1, and 1.5.2 fix this issue. A workaround is available. For users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilege.
Products affected by CVE-2023-30617
- cpe:2.3:a:openkruise:kruise:*:*:*:*:*:*:*:*
- cpe:2.3:a:openkruise:kruise:*:*:*:*:*:*:*:*
- cpe:2.3:a:openkruise:kruise:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-30617
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-30617
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
1.2
|
5.2
|
NIST | 2024-01-11 |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
1.2
|
5.2
|
GitHub, Inc. | 2024-01-03 |
CWE ids for CVE-2023-30617
-
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.Assigned by: security-advisories@github.com (Secondary)
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2023-30617
-
https://github.com/openkruise/kruise/security/advisories/GHSA-437m-7hj5-9mpw
Leverage the kruise-daemon pod to list all secrets in the entire cluster · Advisory · openkruise/kruise · GitHubVendor Advisory
Jump to