Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            References
                    Configurations
                    No configuration.
History
                    06 Aug 2024, 16:30
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
05 Aug 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-05 20:15
Updated : 2024-08-06 16:30
NVD link : CVE-2024-41820
Mitre link : CVE-2024-41820
CVE.ORG link : CVE-2024-41820
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-732
                        
            Incorrect Permission Assignment for Critical Resource
