Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, Crossplane's image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0. As a workaround, only use images from trusted sources and keep Package editing/creating privileges to administrators only.
References
Link | Resource |
---|---|
https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf | Exploit Technical Description Vendor Advisory |
https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-07-27T18:07:13.283Z
Updated: 2023-07-27T18:07:13.283Z
Reserved: 2023-07-18T16:28:12.076Z
Link: CVE-2023-38495
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-07-27T19:15:10.010
Modified: 2023-08-03T13:39:31.713
Link: CVE-2023-38495
JSON object: View
Redhat Information
No data.
CWE