CVE-2022-45933

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-45933
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-45933.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-45933
Aliases
Published
2022-11-27T03:15:11Z
Modified
2025-07-01T14:18:41.970193Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."

References

Affected packages

Git / github.com/benc-uk/kubeview

Affected ranges

Type
GIT
Repo
https://github.com/benc-uk/kubeview
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.0.8
0.1.11
0.1.12
0.1.13
0.1.14
0.1.15
0.1.16
0.1.17
0.1.18
0.1.19
0.1.20
0.1.30
0.1.31
0.1.8