Vulnerability Description
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
CVSS Score
5.3
MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kubernetes | Kubernetes | <= 1.2.0 |
| Redhat | Openshift | 3.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2015-2615.html
- https://access.redhat.com/errata/RHSA-2015:2544
- https://github.com/kubernetes/kubernetes/pull/17886
- https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5
- https://github.com/openshift/origin/pull/6113
- http://rhn.redhat.com/errata/RHSA-2015-2615.html
- https://access.redhat.com/errata/RHSA-2015:2544
- https://github.com/kubernetes/kubernetes/pull/17886
- https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5
- https://github.com/openshift/origin/pull/6113
FAQ
What is CVE-2015-7528?
CVE-2015-7528 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
How severe is CVE-2015-7528?
CVE-2015-7528 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7528?
Check the references section above for vendor advisories and patch information. Affected products include: Kubernetes Kubernetes, Redhat Openshift.