CVE-2020-8564
Description
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
CWE
- CWE-532 — CWE-532 Information Exposure Through Log Files
Affected
- Kubernetes / Kubernetes — v=< 1.19.3 [affected]; v=< 1.18.10 [affected]; v=< 1.17.13 [affected]
CVSS
- 3.1 score=4.7 severity=MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
References
- https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ mailing-list, x_refsource_MLIST
- https://github.com/kubernetes/kubernetes/issues/95622 x_refsource_CONFIRM
- https://security.netapp.com/advisory/ntap-20210122-0006/ x_refsource_CONFIRM
Source
cvelistV5-main/cves/2020/8xxx/CVE-2020-8564.json