Information Exposure Affecting github.com/kubernetes/kube-state-metrics package, versions >=1.7.0 <1.7.2


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High

    Threat Intelligence

    EPSS 0.14% (49th percentile)
Expand this section
NVD
6.5 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMKUBERNETESKUBESTATEMETRICS-471888
  • published 3 Oct 2019
  • disclosed 3 Oct 2019
  • credit Unknown

How to fix?

Upgrade github.com/kubernetes/kube-state-metrics to version 1.7.2 or higher.

Overview

github.com/kubernetes/kube-state-metrics is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects.

Affected versions of this package are vulnerable to Information Exposure. An experimental feature that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. Default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels and therefore exposing the secret content in metrics.

Note: CVE-2019-10223 is a duplicate of CVE-2019-17110.