We found results for “”
CVE-2020-8564
Good to know:
Date: December 7, 2020
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
Language: Go
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Insertion of Sensitive Information into Log File
CWE-532Top Fix
Upgrade Version
Upgrade to version github.com/kubernetes/kubernetes - v1.19.3;github.com/kubernetes/kubernetes - v1.18.10;github.com/kubernetes/kubernetes - v1.17.13;k8s.io/kubernetes - v1.20.0-alpha.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | LOCAL |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | NONE |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


