1.3.1
1.4.1
CVE-2019-11273 affects Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1. This vulnerability involves the logging of usernames and passwords to the billing database, potentially exposing this information to authenticated users with access to those logs. The vulnerability has been resolved in version 1.3.7.
The primary impact of CVE-2019-11273 is the potential exposure of usernames and passwords stored within the PKS billing database. While the information is described as 'non-sensitive,' unauthorized access to these credentials could still facilitate reconnaissance activities or provide a foothold for further attacks. An attacker who has already gained authenticated access to the PKS environment could leverage this vulnerability to enumerate user accounts and potentially escalate their privileges within the system. The blast radius is limited to the PKS environment itself, as the vulnerability does not directly expose external systems.
CVE-2019-11273 was publicly disclosed on July 23, 2019. There is no indication of active exploitation or inclusion in the CISA KEV catalog. Public proof-of-concept code is not readily available, suggesting a relatively low probability of exploitation in the wild.
Organizations utilizing Pivotal Container Service (PKS) versions 1.3.x prior to 1.3.7 and 1.4.x prior to 1.4.1 are at risk. This includes deployments where user authentication credentials are stored within the PKS billing database and where access to these logs is not adequately restricted.
• kubernetes / server:
journalctl -u pks-billing-service | grep -i "username="• kubernetes / server:
kubectl logs -l app=pks-billing-service -f | grep -i "password="disclosure
漏洞利用状态
EPSS
0.18% (39% 百分位)
CVSS 向量
The recommended mitigation for CVE-2019-11273 is to upgrade PKS to version 1.3.7 or later. If an immediate upgrade is not feasible, consider restricting access to the billing database logs to only authorized personnel. Implement robust access controls and auditing to monitor and detect any unauthorized attempts to access the logs. Review existing PKS configurations to ensure adherence to security best practices and minimize the potential impact of this vulnerability.
将 Pivotal Container Services (PKS) 更新到 1.3.7 或更高版本,或 1.4.1 或更高版本,具体取决于您的版本。这将防止凭据记录到账单数据库。请参阅版本说明以获取有关升级的详细说明。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2019-11273 is a vulnerability in PKS versions ≤1.4.x prior to 1.4.1 where usernames and passwords are logged to the billing database, potentially exposing them to authenticated users.
You are affected if you are running PKS versions 1.3.x prior to 1.3.7 or 1.4.x prior to 1.4.1. Check your version and upgrade if necessary.
Upgrade PKS to version 1.3.7 or later. Restrict access to the billing database logs as an interim measure.
There is no current evidence of active exploitation of CVE-2019-11273 in the wild.
Refer to the Pivotal security advisory for detailed information and remediation steps: [https://www.pivotal.io/security/CVE-2019-11273](https://www.pivotal.io/security/CVE-2019-11273)