Allele Security Alert
ASA-2018-00069
Identifier(s)
ASA-2018-00069, CVE-2018-1002105
Title
Proxy request handling in kube-apiserver can leave vulnerable TCP connections
Vendor(s)
Cloud Native Computing Foundation
Product(s)
Kubernetes
Affected version(s)
Kubernetes versions prior to v1.10.11
Kubernetes versions prior to v1.11.5
Kubernetes versions prior to v1.12.3
Fixed version(s)
Kubernetes version v1.10.11
Kubernetes version v1.11.5
Kubernetes version v1.12.3
Kubernetes version v1.13.0-rc.1
Proof of concept
Yes
Description
With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.
Technical details
Unknown
Credits
Darren Shepherd
Reference(s)
CVE-2018-1002105: proxy request handling in kube-apiserver can leave vulnerable TCP connections.
https://github.com/kubernetes/kubernetes/issues/71411
PoC for CVE-2018-1002105
https://github.com/evict/poc_CVE-2018-1002105
CVE-2018-1002105 - Red Hat Customer Portal
https://access.redhat.com/security/cve/CVE-2018-1002105
CVE-2018-1002105
https://security-tracker.debian.org/tracker/CVE-2018-1002105
https://people.canonical.com/~ubuntu-security/cve/CVE-2018-1002105.html
CVE-2018-1002105 | SUSE
https://www.suse.com/security/cve/CVE-2018-1002105
CVE-2018-1002105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002105
CVE-2018-1002105
https://nvd.nist.gov/vuln/detail/CVE-2018-1002105
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: August 29, 2019