[CVE-2022-3172][Kubernetes upstream] Aggregated API server can cause clients to be redirected (SSRF) #38994
Labels
area/k3s
area/kubernetes
area/rke2
RKE2-related Issues
area/security
team/hostbusters
The team that is responsible for provisioning/managing downstream clusters + K8s version support
team/rke2
This issue is to track upstream CVE-2022-3172 in Kubernetes affecting the API server
Original upstream issue kubernetes/kubernetes#112513.
A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.
This issue has been rated medium and assigned CVE-2022-3172.
CVSS Rating: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L (5.1, medium)
Am I vulnerable?
All Kubernetes clusters with the following versions that are running aggregated API servers are impacted. To identify if you have aggregated API servers configured, run the following command:
kubectl get apiservices.apiregistration.k8s.io -o=jsonpath='{range .items[?(@.spec.service)]}{.metadata.name}{"\n"}{end}'
Affected Versions
There are no known mitigations to this vulnerability.
Fixed Versions
Toggle commit message |
1 Not available in Rancher
>= v2.6.9
and>= v2.7.0
yet.2 Not supported in Rancher.
The text was updated successfully, but these errors were encountered: