Vulnerability Name: | CVE-2020-8553 (CCN-186050) | ||||||||||||
Assigned: | 2020-02-19 | ||||||||||||
Published: | 2020-02-19 | ||||||||||||
Updated: | 2020-08-04 | ||||||||||||
Summary: | The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name. | ||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-610 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-8553 Source: XF Type: UNKNOWN kubernetes-cve20208553-sec-bypass(186050) Source: CCN Type: Kubernetes GIT Repository CVE-2020-8553: auth-type basic annotation vulnerability #5126 Source: CONFIRM Type: Third Party Advisory https://github.com/kubernetes/ingress-nginx/issues/5126 Source: CCN Type: IBM Security Bulletin 6338783 (Cloud Private) IBM Cloud Private is vulnerable to a Kubernetes vulnerability (CVE-2020-8553) Source: CCN Type: IBM Security Bulletin 6417467 (Cloud Private) IBM Cloud Private is vulnerable to Kubernetes vulnerabilities Source: CCN Type: IBM Security Bulletin 6436589 (InfoSphere Information Server) Multiple vulnerabilities in Kubernetes affect IBM InfoSphere Information Server Source: CCN Type: IBM Security Bulletin 6452959 (Spectrum Discover) Vulnerabilities in the Python, Docker, and ICP affect IBM Spectrum Discover | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |