Headline
GHSA-74j8-w7f9-pp62: Improper configuration of RBAC permissions obtaining cluster control permissions
Summary
Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster.
Details
detail’s is disable by publish.
PoC
detail’s is disable by publish.
Impact
- sealos public cloud user
- CWE-287 Improper Authentication
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-33190
Improper configuration of RBAC permissions obtaining cluster control permissions
Critical severity GitHub Reviewed Published Jun 29, 2023 in labring/sealos • Updated Jun 30, 2023
Package
gomod github.com/labring/sealos (Go)
Affected versions
< 4.2.1-rc4
Patched versions
4.2.1-rc4
Summary
Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster.
Details
detail’s is disable by publish.
PoC
detail’s is disable by publish.
Impact
- sealos public cloud user
- CWE-287 Improper Authentication
References
- GHSA-74j8-w7f9-pp62
- https://nvd.nist.gov/vuln/detail/CVE-2023-33190
- labring/sealos@4cdf52e
Published to the GitHub Advisory Database
Jun 30, 2023
Last updated
Jun 30, 2023
Related news
Sealos is an open source cloud operating system distribution based on the Kubernetes kernel. In versions of Sealos prior to 4.2.0 an improper configuration of role based access control (RBAC) permissions resulted in an attacker being able to obtain cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster. This issue has been addressed in version 4.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.