Plateforme
kubernetes
Composant
pivotal-container-service-pks
Corrigé dans
1.3.1
1.4.1
CVE-2019-11273 affects Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1. This vulnerability involves the logging of usernames and passwords to the billing database, potentially exposing this information to authenticated users with access to those logs. The vulnerability has been resolved in version 1.3.7.
The primary impact of CVE-2019-11273 is the potential exposure of usernames and passwords stored within the PKS billing database. While the information is described as 'non-sensitive,' unauthorized access to these credentials could still facilitate reconnaissance activities or provide a foothold for further attacks. An attacker who has already gained authenticated access to the PKS environment could leverage this vulnerability to enumerate user accounts and potentially escalate their privileges within the system. The blast radius is limited to the PKS environment itself, as the vulnerability does not directly expose external systems.
CVE-2019-11273 was publicly disclosed on July 23, 2019. There is no indication of active exploitation or inclusion in the CISA KEV catalog. Public proof-of-concept code is not readily available, suggesting a relatively low probability of exploitation in the wild.
Organizations utilizing Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1 are at risk. This includes deployments where user authentication credentials are stored within the PKS billing database and where access to these logs is not adequately restricted.
• kubernetes / server:
journalctl -u pks-billing-service | grep -i "username="• kubernetes / server:
kubectl logs -l app=pks-billing-service -f | grep -i "password="disclosure
Statut de l'Exploit
EPSS
0.18% (percentile 39%)
Vecteur CVSS
The recommended mitigation for CVE-2019-11273 is to upgrade PKS to version 1.3.7 or later. If an immediate upgrade is not feasible, consider restricting access to the billing database logs to only authorized personnel. Implement robust access controls and auditing to monitor and detect any unauthorized attempts to access the logs. Review existing PKS configurations to ensure adherence to security best practices and minimize the potential impact of this vulnerability.
Mettez à jour Pivotal Container Services (PKS) à la version 1.3.7 ou supérieure, ou à la version 1.4.1 ou supérieure, selon le cas. Cela empêchera l'enregistrement des informations d'identification dans la base de données de facturation. Consultez les notes de version pour obtenir des instructions détaillées sur la mise à jour.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2019-11273 is a vulnerability in PKS versions ≤1.4.x prior to 1.4.1 where usernames and passwords are logged to the billing database, potentially exposing them to authenticated users.
You are affected if you are running PKS versions 1.3.x prior to 1.3.7 or 1.4.x prior to 1.4.1. Check your version and upgrade if necessary.
Upgrade PKS to version 1.3.7 or later. Restrict access to the billing database logs as an interim measure.
There is no current evidence of active exploitation of CVE-2019-11273 in the wild.
Refer to the Pivotal security advisory for detailed information and remediation steps: [https://www.pivotal.io/security/CVE-2019-11273](https://www.pivotal.io/security/CVE-2019-11273)
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.