GHSA-69p3-xp37-f692

Suggest an improvement
Source
https://github.com/advisories/GHSA-69p3-xp37-f692
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-69p3-xp37-f692/GHSA-69p3-xp37-f692.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-69p3-xp37-f692
Aliases
Published
2022-03-26T00:00:29Z
Modified
2023-11-01T04:57:12.672598Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Improper Certificate Validation in kubeclient
Details

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

References

Affected packages

RubyGems / kubeclient

Package

Name
kubeclient
Purl
pkg:gem/kubeclient

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.3

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.1.10
0.1.11
0.1.12
0.1.13
0.1.14
0.1.15
0.1.16
0.1.17
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.7.0
0.8.0
0.8.1
0.9.0

1.*

1.0.0
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.2.0

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.4.0
2.5.1
2.5.2

3.*

3.0.0
3.1.0
3.1.1
3.1.2

4.*

4.0.0
4.1.0
4.1.1
4.1.2
4.2.0
4.2.1
4.2.2
4.3.0
4.4.0
4.5.0
4.6.0
4.7.0
4.8.0
4.9.0
4.9.1
4.9.2