Miggo Logo

CVE-2022-46167: Capsule vulnerable to privilege escalation by ServiceAccount deployed in a Tenant Namespace

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.22231%
Published
12/5/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/clastix/capsulego<= 0.1.20.1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from two key gaps:

  1. Missing webhook validation for OwnerReference modifications in Namespaces, allowing detachment from Tenants.
  2. Insufficient enforcement of nodeSelector annotations at the webhook layer. The commit 1df430e added critical webhook checks in owner_reference.go and user_metadata.go to address these issues. The vulnerable functions existed in the pre-patch code where these security checks were absent.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**psul* impl*m*nts * multi-t*n*nt *n* poli*y-**s** *nvironm*nt in * Ku**rn*t*s *lust*r. * S*rvi*****ount **ploy** in * T*n*nt N*m*sp***, w**n *r*nt** wit* `P*T**` **p**iliti*s on its own N*m*sp***, is **l* to **it it *n* r*mov* t** Own*r R***r*n**, *

Reasoning

T** vuln*r**ility st*mm** *rom two k*y **ps: *. Missin* w***ook v*li**tion *or Own*rR***r*n** mo*i*i**tions in N*m*sp***s, *llowin* **t***m*nt *rom T*n*nts. *. Insu**i*i*nt *n*or**m*nt o* no**S*l**tor *nnot*tions *t t** w***ook l*y*r. T** *ommit ****
CVE-2022-46167: Capsule Tenant Detach PrivEsc | Miggo