CVE-2023-37917

KubePi is an opensource kubernetes management panel. A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request. As a result any user may take administrative control of KubePi. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:*

History

31 Jul 2023, 17:33

Type Values Removed Values Added
CPE cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r - (MISC) https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r - Exploit, Third Party Advisory
CWE CWE-269 NVD-CWE-noinfo

21 Jul 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-21 21:15

Updated : 2024-02-05 00:01


NVD link : CVE-2023-37917

Mitre link : CVE-2023-37917

CVE.ORG link : CVE-2023-37917


JSON object : View

Products Affected

fit2cloud

  • kubepi
CWE
NVD-CWE-noinfo CWE-269

Improper Privilege Management