Vulnerability Details : CVE-2023-38495
Potential exploit
Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, Crossplane's image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0. As a workaround, only use images from trusted sources and keep Package editing/creating privileges to administrators only.
Vulnerability category: Input validation
Products affected by CVE-2023-38495
- cpe:2.3:a:cncf:crossplane:*:*:*:*:*:*:*:*
- cpe:2.3:a:cncf:crossplane:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38495
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38495
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
8.3
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
1.6
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2023-38495
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-38495
-
https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m
Possible image tampering from missing image validation for Packages · Advisory · crossplane/crossplane · GitHubVendor Advisory
-
https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf
crossplane/security/ADA-security-audit-23.pdf at ac8b24fe739c5d942ea885157148497f196c3dd3 · crossplane/crossplane · GitHubExploit;Technical Description;Vendor Advisory
Jump to