What kind of vulnerability is it? Who is impacted?
The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: /metadata/identity\oauth2\token/
) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn't have access to.
Has the problem been patched? What versions should users upgrade to?
- We analyzed this bug and determined that we needed to fix it. This fix has been included in AAD Pod Identity release v1.8.13
- If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the v1.8.13
release.
If you have any questions or comments about this advisory:
Open an issue in Azure/aad-pod-identity
{ "nvd_published_at": "2022-12-21T20:15:00Z", "github_reviewed_at": "2022-12-21T18:48:22Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-863" ] }