Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges.
References
Link | Resource |
---|---|
https://gist.github.com/HouqiyuA/1cb964206e0d6bebd1c57a124c55fa03 | Third Party Advisory |
https://github.com/kubeslice/kubeslice | Product |
https://kubeslice.io/documentation/open-source/1.3.0 | Product |
Configurations
History
01 Apr 2025, 20:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:kubeslice:kubeslice:*:*:*:*:*:*:*:* | |
First Time |
Kubeslice kubeslice
Kubeslice |
|
References | () https://gist.github.com/HouqiyuA/1cb964206e0d6bebd1c57a124c55fa03 - Third Party Advisory | |
References | () https://github.com/kubeslice/kubeslice - Product | |
References | () https://kubeslice.io/documentation/open-source/1.3.0 - Product |
24 Mar 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
21 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-21 17:15
Updated : 2025-04-01 20:21
NVD link : CVE-2024-53350
Mitre link : CVE-2024-53350
CVE.ORG link : CVE-2024-53350
JSON object : View
Products Affected
kubeslice
- kubeslice
CWE
CWE-269
Improper Privilege Management