E20-5nnwy1
CVSS:
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
False Positive:
f
Variants:
2
Year:
2018
Description
This strike exploits a privilege escalation vulnerability in Kubernetes API. When an HTTP upgrade request is sent to an API service registered to an Aggregated API Server, or an HTTP upgrade request is sent to a Pod exec, attach, or port-forward resource the tryUpgrade function starts a proxy between the user and kubelet without verifying whether the upgrade request was successful. This results in a privilege escalation and enables the attacker to send unauthorized API requests.