Plattform
kubernetes
Komponente
pivotal-container-service-pks
Behoben in
1.3.1
1.4.1
CVE-2019-11273 affects Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1. This vulnerability involves the logging of usernames and passwords to the billing database, potentially exposing this information to authenticated users with access to those logs. The vulnerability has been resolved in version 1.3.7.
The primary impact of CVE-2019-11273 is the potential exposure of usernames and passwords stored within the PKS billing database. While the information is described as 'non-sensitive,' unauthorized access to these credentials could still facilitate reconnaissance activities or provide a foothold for further attacks. An attacker who has already gained authenticated access to the PKS environment could leverage this vulnerability to enumerate user accounts and potentially escalate their privileges within the system. The blast radius is limited to the PKS environment itself, as the vulnerability does not directly expose external systems.
CVE-2019-11273 was publicly disclosed on July 23, 2019. There is no indication of active exploitation or inclusion in the CISA KEV catalog. Public proof-of-concept code is not readily available, suggesting a relatively low probability of exploitation in the wild.
Organizations utilizing Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1 are at risk. This includes deployments where user authentication credentials are stored within the PKS billing database and where access to these logs is not adequately restricted.
• kubernetes / server:
journalctl -u pks-billing-service | grep -i "username="• kubernetes / server:
kubectl logs -l app=pks-billing-service -f | grep -i "password="disclosure
Exploit-Status
EPSS
0.18% (39% Perzentil)
CVSS-Vektor
The recommended mitigation for CVE-2019-11273 is to upgrade PKS to version 1.3.7 or later. If an immediate upgrade is not feasible, consider restricting access to the billing database logs to only authorized personnel. Implement robust access controls and auditing to monitor and detect any unauthorized attempts to access the logs. Review existing PKS configurations to ensure adherence to security best practices and minimize the potential impact of this vulnerability.
Aktualisieren Sie Pivotal Container Services (PKS) auf Version 1.3.7 oder höher oder auf Version 1.4.1 oder höher, je nach Bedarf. Dadurch wird verhindert, dass Anmeldeinformationen in der Abrechnungsdatenbank protokolliert werden. Weitere detaillierte Anweisungen zur Aktualisierung finden Sie in den Versionshinweisen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2019-11273 is a vulnerability in PKS versions ≤1.4.x prior to 1.4.1 where usernames and passwords are logged to the billing database, potentially exposing them to authenticated users.
You are affected if you are running PKS versions 1.3.x prior to 1.3.7 or 1.4.x prior to 1.4.1. Check your version and upgrade if necessary.
Upgrade PKS to version 1.3.7 or later. Restrict access to the billing database logs as an interim measure.
There is no current evidence of active exploitation of CVE-2019-11273 in the wild.
Refer to the Pivotal security advisory for detailed information and remediation steps: [https://www.pivotal.io/security/CVE-2019-11273](https://www.pivotal.io/security/CVE-2019-11273)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.