What kind of vulnerability is it? Who is impacted?
The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: /metadata/identity\oauth2\token/) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn't have access to.
Has the problem been patched? What versions should users upgrade to?
- We analyzed this bug and determined that we needed to fix it. This fix has been included in AAD Pod Identity release v1.8.13
- If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the v1.8.13 release.
If you have any questions or comments about this advisory:
Open an issue in Azure/aad-pod-identity
{
"nvd_published_at": "2022-12-21T20:15:00Z",
"cwe_ids": [
"CWE-863"
],
"severity": "MODERATE",
"github_reviewed_at": "2022-12-21T18:48:22Z",
"github_reviewed": true
}