Vulnerability Description
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kubernetes | Kubernetes | >= 1.12.0, <= 1.12.4 |
| Netapp | Trident | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/108053Third Party AdvisoryVDB Entry
- https://github.com/kubernetes/kubernetes/issues/76797Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190509-0002/Third Party Advisory
- http://www.securityfocus.com/bid/108053Third Party AdvisoryVDB Entry
- https://github.com/kubernetes/kubernetes/issues/76797Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190509-0002/Third Party Advisory
FAQ
What is CVE-2019-11243?
CVE-2019-11243 is a vulnerability with a CVSS score of 8.1 (HIGH). In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certific...
How severe is CVE-2019-11243?
CVE-2019-11243 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11243?
Check the references section above for vendor advisories and patch information. Affected products include: Kubernetes Kubernetes, Netapp Trident.