Show plain JSON{"id": "CVE-2018-1002103", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Secondary", "source": "jordan@liggitt.net", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2018-12-05T21:29:00.357", "references": [{"url": "https://github.com/kubernetes/minikube/issues/3208", "tags": ["Issue Tracking", "Mitigation", "Third Party Advisory"], "source": "jordan@liggitt.net"}, {"url": "https://github.com/kubernetes/minikube/issues/3208", "tags": ["Issue Tracking", "Mitigation", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem."}, {"lang": "es", "value": "En Minikube 0.3.0-0.29.0, minikube expone el Dashboard de Kubernetes escuchando en la IP VM en el puerto 30000. En los entornos VM en los que la IP es f\u00e1cil de predecir, el atacante puede emplear el reenlace de DNS para realizar peticiones de forma indirecta al Dashboard de Kubernetes y crear una nueva implementaci\u00f3n de Kubernetes que ejecute c\u00f3digo arbitrario. Si se emplea el punto de montaje de minikube, el atacante tambi\u00e9n podr\u00eda obtener acceso directamente al sistema de archivos del host."}], "lastModified": "2024-11-21T03:40:38.700", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:kubernetes:minikube:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "683D36B2-E055-49DB-B07E-6D2EF5A287F1", "versionEndIncluding": "0.29.0", "versionStartIncluding": "0.3.0"}], "operator": "OR"}]}], "sourceIdentifier": "jordan@liggitt.net"}