KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/benc-uk/kubeview/issues/95 |
![]() ![]() |
History
Tue, 29 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published: 2022-11-27T00:00:00.000Z
Updated: 2025-04-29T13:44:59.776Z
Reserved: 2022-11-27T00:00:00.000Z
Link: CVE-2022-45933

Updated: 2024-08-03T14:24:03.236Z

Status : Modified
Published: 2022-11-27T03:15:11.180
Modified: 2025-04-29T14:15:29.817
Link: CVE-2022-45933

No data.