CVE-2019-11253 is a vulnerability in Kubernetes
Published on October 17, 2019
Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.
Vulnerability Analysis
CVE-2019-11253 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Products Associated with CVE-2019-11253
Want to know whenever a new CVE is published for Kubernetes? stack.watch will email you.
Affected Versions
Kubernetes:- Version prior to 1.13.12 is affected.
- Version prior to 1.14.8 is affected.
- Version prior to 1.15.5 is affected.
- Version prior to 1.16.2 is affected.
- Version 1.1 is affected.
- Version 1.2 is affected.
- Version 1.3 is affected.
- Version 1.4 is affected.
- Version 1.5 is affected.
- Version 1.6 is affected.
- Version 1.7 is affected.
- Version 1.8 is affected.
- Version 1.9 is affected.
- Version 1.10 is affected.
- Version 1.11 is affected.
- Version 1.12 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.