CVE-2023-3027
05.06.2023, 22:15
The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | advanced_cluster_management_for_kubernetes | 2.5 |
redhat | advanced_cluster_management_for_kubernetes | 2.6 |
redhat | advanced_cluster_management_for_kubernetes | 2.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-269 - Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.