KubeView vulnerable to full cluster takeover due to improper authentication
Critical severity
GitHub Reviewed
Published
Nov 27, 2022
to the GitHub Advisory Database
•
Updated Aug 17, 2023
Description
Published by the National Vulnerability Database
Nov 27, 2022
Published to the GitHub Advisory Database
Nov 27, 2022
Reviewed
Dec 2, 2022
Last updated
Aug 17, 2023
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
References