• 公告ID (KylinSec-SA-2023-1492)

摘要:

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC.

安全等级: Low

公告ID: KylinSec-SA-2023-1492

发布日期: 2023年7月4日

关联CVE: CVE-2023-34242  

  • 详细介绍

1. 漏洞描述

   

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-34242 KY3.4-4A cilium Unaffected
CVE-2023-34242 KY3.4-5A cilium Unaffected
CVE-2023-34242 KY3.5.1 cilium Unaffected
CVE-2023-34242 KY3.5.2 cilium Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1491 下一篇:KylinSec-SA-2023-1493