CVE-2018-1002102

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-12-05 16:15

Updated : 2024-02-04 20:39


NVD link : CVE-2018-1002102

Mitre link : CVE-2018-1002102

CVE.ORG link : CVE-2018-1002102


JSON object : View

Products Affected

kubernetes

  • kubernetes

fedoraproject

  • fedora
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')