漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
CoreOS Tectonic 1.7.x before 1.7.9-tectonic.4 and 1.8.x before 1.8.4-tectonic.3 mounts a direct proxy to the kubernetes cluster at /api/kubernetes/ which is accessible without authentication to Tectonic and allows an attacker to directly connect to the kubernetes API server. Unauthenticated users are able to list all Namespaces through the Console, resulting in an information disclosure. Tectonic's exposure of an unauthenticated API endpoint containing information regarding the internal state of the cluster can provide an attacker with information that may assist in other attacks against the cluster. For example, an attacker may not have the permissions required to list all namespaces in the cluster but can instead leverage this vulnerability to enumerate the namespaces and then begin to check each namespace for weak authorization policies that may allow further escalation of privileges.
漏洞信息
N/A
漏洞
N/A
漏洞
CoreOS Tectonic 信息泄露漏洞
漏洞信息
CoreOS Tectonic是一套自动化的企业Kubernetes平台。该平台可以自动执行操作任务,实现平台可移植性和多集群管理。 CoreOS Tectonic 1.7.9-tectonic.4之前的1.7.x版本和1.8.4-tectonic.3之前的1.8.x版本中存在信息泄露漏洞。攻击者可利用该漏洞直接连接到kubernetes API服务器,列出全部名称空间并获取有关内部集群状态的消息。
漏洞信息
N/A
漏洞
N/A