GHSA-8cfg-vx93-jvxw

Suggest an improvement
Source
https://github.com/advisories/GHSA-8cfg-vx93-jvxw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-8cfg-vx93-jvxw/GHSA-8cfg-vx93-jvxw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8cfg-vx93-jvxw
Aliases
Related
Published
2023-02-06T23:27:56Z
Modified
2024-09-11T06:13:09.404252Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Kubernetes client-go vulnerable to Sensitive Information Leak via Log File
Details

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.5, <= v1.18.13, <= v1.17.15, < v1.20.0-alpha2.

References

Affected packages

Go / k8s.io/client-go

Package

Name
k8s.io/client-go
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/client-go

Affected ranges

Type
SEMVER
Events
Introduced
0.19.0
Fixed
0.19.6

Go / k8s.io/client-go

Package

Name
k8s.io/client-go
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/client-go

Affected ranges

Type
SEMVER
Events
Introduced
0.20.0-alpha.0
Fixed
0.20.0-alpha.2

Go / k8s.io/client-go

Package

Name
k8s.io/client-go
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/client-go

Affected ranges

Type
SEMVER
Events
Introduced
0.18.0
Fixed
0.18.14

Go / k8s.io/client-go

Package

Name
k8s.io/client-go
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/client-go

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.17.16

Go / k8s.io/kubernetes

Package

Name
k8s.io/kubernetes
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/kubernetes

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.0-alpha.2