CVE-2019-11250: Insertion of Sensitive Information into Log File
(updated )
The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.
References
- www.openwall.com/lists/oss-security/2020/10/16/2
- access.redhat.com/errata/RHSA-2019:4052
- access.redhat.com/errata/RHSA-2019:4087https://nvd.nist.gov/vuln/detail/CVE-2019-11250
- github.com/advisories/GHSA-jmrx-5g74-6v2f
- github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245
- github.com/kubernetes/kubernetes/issues/81114
- github.com/kubernetes/kubernetes/pull/81330
- nvd.nist.gov/vuln/detail/CVE-2019-11250
- pkg.go.dev/vuln/GO-2021-0065
- security.netapp.com/advisory/ntap-20190919-0003/
Detect and mitigate CVE-2019-11250 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →