This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case).
References
Configurations
History
10 Mar 2023, 04:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:snyk:kubernetes_monitor:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-287 | |
References | (MISC) https://snyk.io/blog/api-auth-vuln-snyk-kubernetes-cve-2023-1065/ - Vendor Advisory | |
References | (MISC) https://github.com/snyk/kubernetes-monitor/commit/5b9a7821680bbfb6c4a900ab05d898ce2b2cc157 - Patch | |
References | (MISC) https://github.com/snyk/kubernetes-monitor - Product | |
References | (MISC) https://github.com/snyk/kubernetes-monitor/pull/1275 - Patch |
01 Mar 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Feb 2023, 20:33
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-28 19:15
Updated : 2024-02-04 23:14
NVD link : CVE-2023-1065
Mitre link : CVE-2023-1065
CVE.ORG link : CVE-2023-1065
JSON object : View
Products Affected
snyk
- kubernetes_monitor
CWE
CWE-287
Improper Authentication