CVE-2021-4178

A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Configurations

Configuration 1

cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:5.8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:5.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:a-mq_streams:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fuse:7.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_quarkus:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_quarkus:2.2.5:*:*:*:*:*:*:*

Information

Published : 2022-08-24 04:15

Updated : 2022-10-04 05:55


NVD link : CVE-2021-4178

Mitre link : CVE-2021-4178

Products Affected
CWE
CWE-502

Deserialization of Untrusted Data