CVE-2020-8559Open Redirect in Kubernetes

CWE-601Open Redirect10 documents7 sources
Severity
6.8MEDIUMNVD
CNA6.4
EPSS
51.2%
top 2.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22
Latest updateMay 20

Description

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages5 packages

Gok8s.io/kubernetes1.17.01.17.9+2
NVDkubernetes/kubernetes1.16.01.16.13+3
Debiankubernetes/kubernetes< 1.18.5-1+3
CVEListV5kubernetes/kubernetes1.161.16.12+12
Gok8s.io/apimachinery0.17.00.17.9+3

Patches

🔴Vulnerability Details

5
OSV
Privilege Escalation in Kubernetes in k8s.io/apimachinery2024-05-20
GHSA
Privilege Escalation in Kubernetes2024-04-24
OSV
Privilege Escalation in Kubernetes2024-04-24
CVEList
Privilege escalation from compromised node to cluster2020-07-22
OSV
CVE-2020-8559: The Kubernetes kube-apiserver in versions v12020-07-22

📋Vendor Advisories

2
Red Hat
kubernetes: compromised node could escalate to cluster level privileges2020-07-15
Debian
CVE-2020-8559: kubernetes - The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.1...2020

💬Community

2
Bugzilla
CVE-2020-8559 origin: kubernetes: compromised node could escalate to cluster level privileges [fedora-all]2020-07-15
Bugzilla
CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges2020-06-26
CVE-2020-8559 — Open Redirect in K8s.io Kubernetes | cvebase