Skip to content

Privilege escalation using hop-by-hop Connection header

High
prometherion published GHSA-9cwv-cppx-mqjm Feb 20, 2022

Package

No package listed

Affected versions

<= v0.2.0

Patched versions

None

Description

Impact

Using a malicious Connection header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the cluster-admin Role bound to capsule-proxy.

Patches

Patch has been merged in the v0.2.1 release.

Workarounds

Upgrading is mandatory.

Severity

High

CVE ID

CVE-2022-23652

Weaknesses

No CWEs

Credits