CVE-2018-1002102 | Date: (C)2019-12-09 (M)2023-12-22 |
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 2.6 | CVSS Score : 2.1 |
Exploit Score: 1.0 | Exploit Score: 3.9 |
Impact Score: 1.4 | Impact Score: 2.9 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: NETWORK | Access Vector: NETWORK |
Attack Complexity: HIGH | Access Complexity: HIGH |
Privileges Required: HIGH | Authentication: SINGLE |
User Interaction: REQUIRED | Confidentiality: PARTIAL |
Scope: CHANGED | Integrity: NONE |
Confidentiality: LOW | Availability: NONE |
Integrity: NONE | |
Availability: NONE | |
| |