Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/clusternet/clusternet: GHSA-833c-xh79-p429 #1734

Closed
GoVulnBot opened this issue Apr 21, 2023 · 2 comments
Assignees
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-833c-xh79-p429, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/clusternet/clusternet 0.15.2 < 0.15.2

Cross references:
No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/clusternet/clusternet
    versions:
      - fixed: 0.15.2
    packages:
      - package: github.com/clusternet/clusternet
summary: A potential risk in clusternet which can be leveraged to make a cluster-level
    privilege escalation
description: |-
    ## Summary:
    A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation.
    ## Detailed analysis:
    The clusternet has a deployment called cluster-hub inside the clusternet-system Kubernetes namespace, which runs on worker nodes
    randomly. The deployment has a service account called clusternet-hub, which has a cluster role called clusternet:hub via cluster role binding. The clusternet:hub cluster role has "*" verbs of "*.*" resources. Thus, if a malicious user can access the worker node which runs the clusternet, he/she can leverage the service account to do malicious actions to critical system resources. For example, he/she can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation.
ghsas:
  - GHSA-833c-xh79-p429
references:
  - advisory: https://github.com/clusternet/clusternet/security/advisories/GHSA-833c-xh79-p429
  - web: https://github.com/clusternet/clusternet/releases/tag/v0.15.2
  - advisory: https://github.com/advisories/GHSA-833c-xh79-p429

@neild neild self-assigned this Apr 21, 2023
@neild neild added the excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. label Jun 13, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/503837 mentions this issue: data/excluded: batch add 21 excluded reports

@neild
Copy link
Contributor

neild commented Jun 15, 2023

Duplicate of #1735

@neild neild marked this as a duplicate of #1735 Jun 15, 2023
@neild neild closed this as completed Jun 15, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Projects
None yet
Development

No branches or pull requests

3 participants