製品・ソフトウェアに関する情報
CoreOS Tectonic における情報漏えいに関する脆弱性
Title CoreOS Tectonic における情報漏えいに関する脆弱性
Summary

CoreOS Tectonic には、情報漏えいに関する脆弱性が存在します。

Possible impacts 情報を取得される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date Jan. 4, 2018, midnight
Registration Date July 13, 2018, 5:59 p.m.
Last Update July 13, 2018, 5:59 p.m.
CVSS3.0 : 重要
Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected System
CoreOS
Tectonic 1.7.9-tectonic.4 未満の 1.7.x
Tectonic 1.8.4-tectonic.3 未満の 1.8.x
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年07月13日]
  掲載
July 13, 2018, 5:59 p.m.

NVD Vulnerability Information
CVE-2018-5256
Summary

CoreOS Tectonic 1.7.x before 1.7.9-tectonic.4 and 1.8.x before 1.8.4-tectonic.3 mounts a direct proxy to the kubernetes cluster at /api/kubernetes/ which is accessible without authentication to Tectonic and allows an attacker to directly connect to the kubernetes API server. Unauthenticated users are able to list all Namespaces through the Console, resulting in an information disclosure. Tectonic's exposure of an unauthenticated API endpoint containing information regarding the internal state of the cluster can provide an attacker with information that may assist in other attacks against the cluster. For example, an attacker may not have the permissions required to list all namespaces in the cluster but can instead leverage this vulnerability to enumerate the namespaces and then begin to check each namespace for weak authorization policies that may allow further escalation of privileges.

Publication Date May 19, 2018, 12:29 a.m.
Registration Date March 1, 2021, 7:30 p.m.
Last Update Nov. 21, 2024, 1:08 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:redhat:tectonic:*:*:*:*:*:*:*:* 1.7.1-tectonic.1 1.7.9-tectonic.4
cpe:2.3:a:redhat:tectonic:*:*:*:*:*:*:*:* 1.8.4-tectonic.1 1.8.4-tectonic.3
Related information, measures and tools
Common Vulnerabilities List