CVE-2023-5056

Published: Dic 18, 2023 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2023-57399 Aliases: GSD-2023-5056
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,8
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0005
Percentile
0,2th
Updated

EPSS Score Trend (Last 90 Days)

862

Missing Authorization

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Access Control Availability
Potential Impacts:
Read Application Data Read Files Or Directories Modify Application Data Modify Files Or Directories Gain Privileges Or Assume Identity Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Resource Consumption (Other)
Applicable Platforms
Technologies: AI/ML, Database Server, Not Technology-Specific, Web Server
View CWE Details
Application

Service Interconnect by Redhat

cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://access.redhat.com/errata/RHSA-2023:6219
https://access.redhat.com/security/cve/CVE-2023-5056
https://bugzilla.redhat.com/show_bug.cgi?id=2239517
https://access.redhat.com/errata/RHSA-2023:6219
https://access.redhat.com/security/cve/CVE-2023-5056
https://bugzilla.redhat.com/show_bug.cgi?id=2239517