Rapid7 Vulnerability & Exploit Database

Kubernetes: CVE-2019-11243: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Kubernetes: CVE-2019-11243: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
04/22/2019
Created
05/10/2019
Added
05/09/2019
Modified
05/09/2019

Description

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()

Solution(s)

  • kubernetes-upgrade-1_12_4
  • kubernetes-upgrade-1_13_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;