Kubernetes kubelet vulnerability allows arbitrary command execution via specially crafted gitRepo volumes
CVE-2024-10220
Key Information
- Vendor
- Kubernetes
- Status
- Kubelet
- Vendor
- CVE Published:
- 22 November 2024
Badges
Summary
A high-severity vulnerability has been discovered in Kubernetes, potentially allowing attackers to execute arbitrary commands outside of container boundaries.The vulnerability tracked as CVE-2024-10220 with a CVSS score of 8.1, affects Kubernetes clusters running specific versions of kubelet. The vulnerability exploits theĀ gitRepoĀ volume, a feature used to clone Git repositories into pods. By manipulating theĀ hooksĀ folder within the target repository, this could allow malicious actors to gain unauthorized access to sensitive data, escalate privileges, and compromise the entire Kubernetes cluster. The affected versions of kubelet include:v1.30.0 to v1.30.2v1.29.0 to v1.29.6<= v1.28.11. Kubernetes users are urged to upgrade their clusters to one of the fixed versions:master/v1.31.0, v1.30.3, v1.29.7, v1.28.12. As theĀ gitRepoĀ volume has been deprecated, the recommended solution is to migrate away from this feature. Kubernetes suggests performing Git clone operations using an init container and mounting the resulting directory into the podās container.
Affected Version(s)
kubelet <= 1.28.11
kubelet <= 1.29.6
kubelet <= 1.30.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Kubernetes affected by CVE-2024-10220 Flaw
A high-severity vulnerability has been discovered in Kubernetes, potentially allowing attackers to execute arbitrary commands outside of container boundaries. The vulnerability tracked as CVE-2024-10220 with a CVSS score of 8.1, affects Kubernetes clusters running specific versions of kubelet. The v...
1 month ago
Refferences
CVSS V3.1
Timeline
- š“
Public PoC available
- š¾
Exploit known to exist
First article discovered by TheCyberThrone
Vulnerability published
Vulnerability Reserved