Vulnerability Name: | CVE-2021-4178 (CCN-222690) | ||||||||||||
Assigned: | 2021-12-27 | ||||||||||||
Published: | 2021-12-27 | ||||||||||||
Updated: | 2022-10-04 | ||||||||||||
Summary: | A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML. | ||||||||||||
CVSS v3 Severity: | 6.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-502 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-4178 Source: MISC Type: Vendor Advisory https://access.redhat.com/security/cve/CVE-2021-4178 Source: CCN Type: Red Hat Bugzilla - Bug 2034388 CVE-2021-4178 kubernetes-client: Insecure deserialization in unmarshalYaml method Source: MISC Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2034388 Source: XF Type: UNKNOWN fabric8-cve20214178-code-exec(222690) Source: MISC Type: Third Party Advisory https://github.com/advisories/GHSA-98g7-rxmf-rrxm Source: CCN Type: kubernetes-client GIT Reposiotry Security issue in kubernetes-client #3653 Source: MISC Type: Issue Tracking, Third Party Advisory https://github.com/fabric8io/kubernetes-client/issues/3653 Source: CCN Type: kubernetes-client GIT Reposiotry test: Verification for Security issue in kubernetes-client #3653 fix #3720 Source: CCN Type: IBM Security Bulletin 6601275 (Event Streams) IBM Event Streams is vulnerable to arbitrary code execution due to the Fabric8 Kubernetes client (CVE-2021-4178) Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-4178 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
BACK |