Kubernetes kubelet vulnerability allows arbitrary command execution via specially crafted gitRepo volumes

CVE-2024-10220

8.1HIGH

Key Information

Vendor
Kubernetes
Status
Kubelet
Vendor
CVE Published:
22 November 2024

Badges

šŸ‘¾ Exploit ExistsšŸ”“ Public PoCšŸ“° News Worthy

Summary

A high-severity vulnerability has been discovered in Kubernetes, potentially allowing attackers to execute arbitrary commands outside of container boundaries.The vulnerability tracked as CVE-2024-10220 with a CVSS score of 8.1, affects Kubernetes clusters running specific versions of kubelet. The vulnerability exploits theĀ gitRepoĀ volume, a feature used to clone Git repositories into pods. By manipulating theĀ hooksĀ folder within the target repository, this could allow malicious actors to gain unauthorized access to sensitive data, escalate privileges, and compromise the entire Kubernetes cluster. The affected versions of kubelet include:v1.30.0 to v1.30.2v1.29.0 to v1.29.6<= v1.28.11. Kubernetes users are urged to upgrade their clusters to one of the fixed versions:master/v1.31.0, v1.30.3, v1.29.7, v1.28.12. As theĀ gitRepoĀ volume has been deprecated, the recommended solution is to migrate away from this feature. Kubernetes suggests performing Git clone operations using an init container and mounting the resulting directory into the podā€™s container.

Affected Version(s)

kubelet <= 1.28.11

kubelet <= 1.29.6

kubelet <= 1.30.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Kubernetes affected by CVE-2024-10220 Flaw

A high-severity vulnerability has been discovered in Kubernetes, potentially allowing attackers to execute arbitrary commands outside of container boundaries. The vulnerability tracked as CVE-2024-10220 with a CVSS score of 8.1, affects Kubernetes clusters running specific versions of kubelet. The v...

1 month ago

Refferences

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • šŸ”“

    Public PoC available

  • šŸ‘¾

    Exploit known to exist

  • First article discovered by TheCyberThrone

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database3 Proof of Concept(s)1 News Article(s)

Credit

Imre Rad
Imre Rad
.