In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.
References
Link | Resource |
---|---|
https://github.com/kubernetes/minikube/issues/3208 | Mitigation Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: kubernetes
Published: 2022-10-03T16:21:40
Updated: 2022-10-03T16:21:40
Reserved: 2022-10-03T00:00:00
Link: CVE-2018-1002103
JSON object: View
NVD Information
Status : Modified
Published: 2018-12-05T21:29:00.357
Modified: 2019-10-09T23:32:34.180
Link: CVE-2018-1002103
JSON object: View
Redhat Information
No data.
CWE