A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
A-mq Streams
Subscribe
Amq Streams
Subscribe
Build Of Quarkus
Subscribe
Camel Quarkus
Subscribe
Descision Manager
Subscribe
Fabric8-kubernetes
Subscribe
Fuse
Subscribe
Integration Camel K
Subscribe
Integration Camel Quarkus
Subscribe
Jboss Fuse
Subscribe
Ocp Tools
Subscribe
Openshift Application Runtimes
Subscribe
Process Automation
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6304 | A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML. |
Github GHSA |
GHSA-98g7-rxmf-rrxm | fabric8 kubernetes-client vulnerable |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:16:04.264Z
Reserved: 2021-12-27T00:00:00
Link: CVE-2021-4178
No data.
Status : Modified
Published: 2022-08-24T16:15:09.770
Modified: 2024-11-21T06:37:04.627
Link: CVE-2021-4178
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA