CVE-2022-46167: Capsule vulnerable to privilege escalation by ServiceAccount deployed in a Tenant Namespace
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22231%
CWE
Published
12/5/2022
Updated
1/31/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/clastix/capsule | go | <= 0.1.2 | 0.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key gaps:
- Missing webhook validation for OwnerReference modifications in Namespaces, allowing detachment from Tenants.
- Insufficient enforcement of nodeSelector annotations at the webhook layer. The commit 1df430e added critical webhook checks in owner_reference.go and user_metadata.go to address these issues. The vulnerable functions existed in the pre-patch code where these security checks were absent.