Skupper Operator Auth Bypass Allows Cross-Cluster Deployment Visibility
CVE-2023-5056 Published on December 18, 2023
Skupper-operator: privelege escalation via config map
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
Vulnerability Analysis
Timeline
Reported to Red Hat.
Made public. 44 days later.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2023-5056 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2023-5056
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-5056 are published in Red Hat Service Interconnect:
Affected Versions
Red Hat Service Interconnect 1 for RHEL 9:- Version 1.4.3-5 and below * is unaffected.
- Version 1.4.3-5 and below * is unaffected.
- Version 1.4.3-6 and below * is unaffected.
- Version 2.4.3-3 and below * is unaffected.
- Version 1.4.3-4 and below * is unaffected.
- Version 1.4.3-6 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.