CVE-2021-38182

Due to insufficient input validation of Kyma, authenticated users can pass a Header of their choice and escalate privileges which can completely compromise the cluster.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kyma-project:kyma:*:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-116

17 Dec 2021, 16:34

Type Values Removed Values Added
CPE cpe:2.3:a:kyma-project:kyma:*:*:*:*:*:*:*:*
References (MISC) https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - (MISC) https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 - Not Applicable
References (MISC) https://github.com/kyma-project/kyma/security/advisories/GHSA-2vjp-5q24-hqjv - (MISC) https://github.com/kyma-project/kyma/security/advisories/GHSA-2vjp-5q24-hqjv - Third Party Advisory
CWE CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8

14 Dec 2021, 16:35

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-14 16:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-38182

Mitre link : CVE-2021-38182

CVE.ORG link : CVE-2021-38182


JSON object : View

Products Affected

kyma-project

  • kyma
CWE
CWE-116

Improper Encoding or Escaping of Output

CWE-20

Improper Input Validation