KubePi is an opensource kubernetes management panel. A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request. As a result any user may take administrative control of KubePi. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability..This CVE has a CVSS3.1 score of 9.1 and a Base Severity of CRITICAL.
Info | Details |
---|---|
CVE ID | CVE-2023-37917 |
CVE State | PUBLISHED |
BaseScore | 9.1 |
BaseSeverity | CRITICAL |
VectorString | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L |
Version | NA |
References for CVE-2023-37917 :
https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | LOW |
UserInteraction(UI) | NONE |
Scope(S) | CHANGED |
Confidentiality(C) | LOW |
Availability(A) | LOW |
Integrity(I) | HIGH |