-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2018-1002103: Dashboard vulnerable to DNS rebinding attack #3208
Comments
This is a fix release for CVE-2018-1002103. More details in kubernetes/minikube#3208
This is a fix release for CVE-2018-1002103. More details in kubernetes/minikube#3208 (cherry picked from commit e5ee89f) Backport of #48256
minikube is not running in production for any one and its only for learning and prototyping, who is going to do DNS attacks if its not on a public domain. |
@bhishekarora you would target developers using minikube, and from there pwn the things the developers have access to.
one thing to note is that this issue allowed trivial VM escape, so you would gain RCE and persistence on the host OS (and the engineer's passwords, private keys, emails etc.) full disclosure: I'm the nerd who reported this issue |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
minikube exposes the Kubernetes Dashboard service with a configuration that makes it vulnerable to DNS rebinding attacks.
Thanks to Alex Kaskasoli (MWR Labs) for reporting this problem [1]
Vulnerable versions:
Vulnerable configurations:
Vulnerability impact:
If an attacker gets a victim to visit a malicious web page, the attacker may be able to execute arbitrary code within the victim's minikube cluster.
minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard without violating the Same-Origin Policy.
The attacker can generate a CSRF token from the
/api/v1/csrftoken/appdeploymentfromfile
endpoint, and pass this token to the/api/v1/appdeploymentfromfile
endpoint to create a new Kubernetes Deployment running a payload of their choosing.This vulnerability can be combined with a VM-specific vulnerability to escape to the host operating system. If
minikube mount
is in use, the attacker could also directly access the host filesystem.Fixed versions:
Fix impact:
Network access to the dashboard service is now provided on an as-needed basis, and is managed by
kubectl proxy
which enforces HTTP header checks to protect against DNS rebinding attacks.Mitigations before upgrading:
Disable the dashboard entirely:
Additional information
The text was updated successfully, but these errors were encountered: