CVE-2023-30512: CubeFS allows Kubernetes cluster-level privilege escalation
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19898%
CWE
Published
4/12/2023
Updated
5/15/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/cubefs/cubefs | go | <= 3.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Kubernetes RBAC configuration rather than specific code functions. The cluster role 'cfs-csi-cluster-role' associated with the DaemonSet grants excessive permissions (secrets/list) at the cluster level. This misconfiguration in Kubernetes manifests (YAML files) allows privilege escalation, but no specific Go functions in the CubeFS codebase are directly implicated. The vulnerability is infrastructure/configuration
-related rather than stemming from flawed application logic in code functions.