capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8 | Patch Third Party Advisory |
https://github.com/clastix/capsule-proxy/issues/188 | Exploit Issue Tracking Third Party Advisory |
https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-02-22T19:55:11
Updated: 2022-02-22T19:55:10
Reserved: 2022-01-19T00:00:00
Link: CVE-2022-23652
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-22T20:15:07.763
Modified: 2022-03-01T20:08:43.070
Link: CVE-2022-23652
JSON object: View
Redhat Information
No data.
CWE