x/vulndb: potential Go vuln in github.com/projectcapsule/capsule-proxy: CVE-2023-46254 #2179
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
CVE-2023-46254 references github.com/projectcapsule/capsule-proxy, which may be a Go module.
Description:
capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by
capsule-proxy
gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenantssolar
andwind
. Tenantsolar
, owned by a ServiceAccount namedtenant-owner
in the Namespacesolar
. Tenantwind
, owned by a ServiceAccount namedtenant-owner
in the Namespacewind
. The Tenant ownersolar
would be able to list the namespaces of the Tenantwind
and vice-versa, although this is not correct. The bug introduces an exfiltration vulnerability since allows the listing of Namespace resources of other Tenants, although just in some specific conditions: 1.capsule-proxy
runs with the--disable-caching=false
(default value:false
) and 2. Tenant owners are ServiceAccount, with the same resource name, but in different Namespaces. This vulnerability doesn't allow any privilege escalation on the outer tenant Namespace-scoped resources, since the Kubernetes RBAC is enforcing this. This issue has been addressed in version 0.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.References:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: