Description A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
CVSS vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Exploitability: 0.8 | Impact: 5.9 Attack Vector: Local
Complexity: Low
Privileges: High
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages9 packages ▶ CVEListV5 kubernetes-client Affects 5.x versions, Fixed in kubernetes-client v5.0.3 and above. Show 4 more packages
🔴 Vulnerability Details3 CVEList CVE-2021-4178: A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5 ↗ 2022-08-24 ▶ GHSA fabric8 kubernetes-client vulnerable ↗ 2022-07-15 ▶ OSV fabric8 kubernetes-client vulnerable ↗ 2022-07-15 ▶
📋 Vendor Advisories1 Red Hat kubernetes-client: Insecure deserialization in unmarshalYaml method ↗ 2022-01-05 ▶