Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-74j8-w7f9-pp62: Improper configuration of RBAC permissions obtaining cluster control permissions

Summary

Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster.

Details

detail’s is disable by publish.

PoC

detail’s is disable by publish.

Impact

  • sealos public cloud user
  • CWE-287 Improper Authentication
ghsa
#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-33190

Improper configuration of RBAC permissions obtaining cluster control permissions

Critical severity GitHub Reviewed Published Jun 29, 2023 in labring/sealos • Updated Jun 30, 2023

Package

gomod github.com/labring/sealos (Go)

Affected versions

< 4.2.1-rc4

Patched versions

4.2.1-rc4

Summary

Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster.

Details

detail’s is disable by publish.

PoC

detail’s is disable by publish.

Impact

  • sealos public cloud user
  • CWE-287 Improper Authentication

References

  • GHSA-74j8-w7f9-pp62
  • https://nvd.nist.gov/vuln/detail/CVE-2023-33190
  • labring/sealos@4cdf52e

Published to the GitHub Advisory Database

Jun 30, 2023

Last updated

Jun 30, 2023

Related news

CVE-2023-33190: Improper configuration of RBAC permissions obtaining cluster control permissions

Sealos is an open source cloud operating system distribution based on the Kubernetes kernel. In versions of Sealos prior to 4.2.0 an improper configuration of role based access control (RBAC) permissions resulted in an attacker being able to obtain cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster. This issue has been addressed in version 4.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ghsa: Latest News

GHSA-c72g-53hw-82q7: OpenFGA Authorization Bypass