CVE-2023-37917

KubePi is an opensource kubernetes management panel. A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request. As a result any user may take administrative control of KubePi. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:*

History

31 Jul 2023, 17:33

Type Values Removed Values Added
References (MISC) https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r - (MISC) https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r - Exploit, Third Party Advisory
CWE CWE-269 NVD-CWE-noinfo
First Time Fit2cloud kubepi
Fit2cloud
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:*

21 Jul 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-21 21:15

Updated : 2023-07-31 17:33


NVD link : CVE-2023-37917

Mitre link : CVE-2023-37917


JSON object : View

Products Affected

fit2cloud

  • kubepi