CVE-2020-8561 is a vulnerability in Kubernetes
Published on September 20, 2021
Webhook redirect in kube-apiserver
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Vulnerability Analysis
CVE-2020-8561 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
What is a Confused Deputy Vulnerability?
The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.
CVE-2020-8561 has been classified to as a Confused Deputy vulnerability or weakness.
Products Associated with CVE-2020-8561
Want to know whenever a new CVE is published for Kubernetes? stack.watch will email you.
Affected Versions
Kubernetes:- Version unspecified, <= 1.20.11 is affected.
- Version next of 1.20.11 and below unspecified is unknown.
- Version unspecified, <= 1.21.5 is affected.
- Version next of 1.21.5 and below unspecified is unknown.
- Version unspecified, <= 1.22.2 is affected.
- Version next of 1.22.2 and below unspecified is unknown.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.