漏洞标题
cilium-agent容器可以通过`hostPath`挂载访问主机。
漏洞描述信息
cilium-agent容器可以通过`hostPath`挂载访问主机
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
漏洞类别
N/A
漏洞标题
cilium-agent container can access the host via `hostPath` mount
漏洞描述信息
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, an attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node.
The issue has been fixed and the fix is available on versions 1.11.15, 1.12.8, and 1.13.1. Some workarounds are available. Kubernetes RBAC should be used to deny users and service accounts `exec` access to Cilium agent pods. In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
漏洞类别
缺省权限不正确
漏洞标题
Cilium 安全漏洞
漏洞描述信息
Cilium是一个开源软件。用于提供和透明地保护应用程序工作负载(如应用程序容器或进程)之间的网络连接和负载平衡。 Cilium 1.11.14版本及之前版本、1.12.7版本及之前版本、1.13.0版本存在安全漏洞。攻击者利用该漏洞可以获得对底层节点的访问权限。
CVSS信息
N/A
漏洞类别
其他