Bug 2227129 (CVE-2023-3893) - CVE-2023-3893 kubernetes: Insufficient input sanitization on kubernetes CSI proxy leads to privilege escalation
Summary: CVE-2023-3893 kubernetes: Insufficient input sanitization on kubernetes CSI p...
Keywords:
Status: NEW
Alias: CVE-2023-3893
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2227127
TreeView+ depends on / blocked
 
Reported: 2023-07-28 05:00 UTC by Avinash Hanwate
Modified: 2023-08-23 18:23 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-07-28 05:00:50 UTC
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate 
to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy. Any kubernetes environment with Windows nodes that are running kubernetes-csi-proxy is impacted. This is a common default configuration on Windows nodes. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.


Note You need to log in before you can comment on or make changes to this bug.