
=====================================================================

                             CERT-Renater

                   Note d'Information No. 2021/VULN091
____________________________________________________________________

DATE                : 23/02/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running capsule-proxy versions prior
                                     to 0.2.1.

=====================================================================
https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm
_____________________________________________________________________

Privilege escalation using hop-by-hop Connection header
High	prometherion published GHSA-9cwv-cppx-mqjm


Package               No package listed
Affected versions     <= v0.2.0
Patched versions      None


Description
Impact
Using a malicious Connection header, an attacker with a proper
authentication mechanism could start a privilege escalation towards the
Kubernetes API Server, being able to exploit the cluster-admin Role
bound to capsule-proxy.


Patches
Patch has been merged in the v0.2.1 release.


Workarounds
Upgrading is mandatory.


CVE ID
CVE-2022-23652

Credits
@enj enj Mo Khan


=========================================================
+ CERT-RENATER       | tel : 01-53-94-20-44             +
+ 23/25 Rue Daviel   | fax : 01-53-94-20-41             +
+ 75013 Paris        | email:cert@support.renater.fr    +
=========================================================

