Plataforma
kubernetes
Componente
pivotal-container-service-pks
Corrigido em
1.3.1
1.4.1
CVE-2019-11273 affects Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1. This vulnerability involves the logging of usernames and passwords to the billing database, potentially exposing this information to authenticated users with access to those logs. The vulnerability has been resolved in version 1.3.7.
The primary impact of CVE-2019-11273 is the potential exposure of usernames and passwords stored within the PKS billing database. While the information is described as 'non-sensitive,' unauthorized access to these credentials could still facilitate reconnaissance activities or provide a foothold for further attacks. An attacker who has already gained authenticated access to the PKS environment could leverage this vulnerability to enumerate user accounts and potentially escalate their privileges within the system. The blast radius is limited to the PKS environment itself, as the vulnerability does not directly expose external systems.
CVE-2019-11273 was publicly disclosed on July 23, 2019. There is no indication of active exploitation or inclusion in the CISA KEV catalog. Public proof-of-concept code is not readily available, suggesting a relatively low probability of exploitation in the wild.
Organizations utilizing Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1 are at risk. This includes deployments where user authentication credentials are stored within the PKS billing database and where access to these logs is not adequately restricted.
• kubernetes / server:
journalctl -u pks-billing-service | grep -i "username="• kubernetes / server:
kubectl logs -l app=pks-billing-service -f | grep -i "password="disclosure
Status do Exploit
EPSS
0.18% (percentil 39%)
Vetor CVSS
The recommended mitigation for CVE-2019-11273 is to upgrade PKS to version 1.3.7 or later. If an immediate upgrade is not feasible, consider restricting access to the billing database logs to only authorized personnel. Implement robust access controls and auditing to monitor and detect any unauthorized attempts to access the logs. Review existing PKS configurations to ensure adherence to security best practices and minimize the potential impact of this vulnerability.
Atualize Pivotal Container Services (PKS) para a versão 1.3.7 ou superior, ou para a versão 1.4.1 ou superior, conforme apropriado. Isso evitará que as credenciais sejam registradas no banco de dados de faturamento. Consulte as notas de versão para obter instruções detalhadas sobre a atualização.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2019-11273 is a vulnerability in PKS versions ≤1.4.x prior to 1.4.1 where usernames and passwords are logged to the billing database, potentially exposing them to authenticated users.
You are affected if you are running PKS versions 1.3.x prior to 1.3.7 or 1.4.x prior to 1.4.1. Check your version and upgrade if necessary.
Upgrade PKS to version 1.3.7 or later. Restrict access to the billing database logs as an interim measure.
There is no current evidence of active exploitation of CVE-2019-11273 in the wild.
Refer to the Pivotal security advisory for detailed information and remediation steps: [https://www.pivotal.io/security/CVE-2019-11273](https://www.pivotal.io/security/CVE-2019-11273)
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.