CVE-2022-45933

KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
References
Link Resource
https://github.com/benc-uk/kubeview/issues/95 Exploit Issue Tracking
Configurations

Configuration 1

cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:*

Information

Published : 2022-11-27 03:15

Updated : 2022-12-01 06:41


NVD link : CVE-2022-45933

Mitre link : CVE-2022-45933

Products Affected
No products.
CWE