This repository has been archived by the owner on Sep 9, 2024. It is now read-only.
github.com/kanisterio/kanister-v0.0.0-20230926202220-eb892498a2f9: 1 vulnerabilities (highest severity is: 8.8) #17
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
Vulnerable Library - github.com/kanisterio/kanister-v0.0.0-20230926202220-eb892498a2f9
Library home page: https://proxy.golang.org/github.com/kanisterio/kanister/@v/v0.0.0-20230926202220-eb892498a2f9.zip
Path to dependency file: /Kanister Visualiser/go.mod
Path to vulnerable library: /Kanister Visualiser/go.mod
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-43403
Vulnerable Library - github.com/kanisterio/kanister-v0.0.0-20230926202220-eb892498a2f9
Library home page: https://proxy.golang.org/github.com/kanisterio/kanister/@v/v0.0.0-20230926202220-eb892498a2f9.zip
Path to dependency file: /Kanister Visualiser/go.mod
Path to vulnerable library: /Kanister Visualiser/go.mod
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Kanister is a data protection workflow management tool. The kanister has a deployment called default-kanister-operator, which is bound with a ClusterRole called edit via ClusterRoleBinding. The "edit" ClusterRole is one of Kubernetes default-created ClusterRole, and it has the create/patch/udpate verbs of daemonset resources, create verb of serviceaccount/token resources, and impersonate verb of serviceaccounts resources. A malicious user can leverage access the worker node which has this component to make a cluster-level privilege escalation.
Publish Date: 2024-08-20
URL: CVE-2024-43403
CVSS 3 Score Details (8.8)
Base Score Metrics:
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: