Miggo Logo

CVE-2023-34242: Cilium vulnerable to information leakage via incorrect ReferenceGrant handling

3.4

CVSS Score
3.1

Basic Information

EPSS Score
0.15542%
Published
6/16/2023
Updated
11/8/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cilium/ciliumgo>= 1.13.0, < 1.13.41.13.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper namespace validation when handling ReferenceGrants in the Gateway API implementation. Key indicators:

  1. The CVE description explicitly mentions missing namespace checks on ReferenceGrant creation
  2. Gateway API's security model requires ReferenceGrants to be namespace-scoped protections
  3. The fix version (1.13.4) likely added namespace validation in ReferenceGrant handling logic
  4. The affected functionality relates to cross-namespace secret/service access authorization

While exact code diffs aren't available, the pattern matches common Kubernetes admission control issues where namespace-boundary checks are missing in reference validation functions. The high-confidence entry point is the ReferenceGrant controller's handling logic, while the admission webhook validation is a secondary potential location.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t W**n t** [**t*w*y *PI](*ttps://*o*s.*ilium.io/*n/v*.**/n*twork/s*rvi**m*s*/**t*w*y-*pi/**t*w*y-*pi/) is *n**l** in *ilium, t** **s*n** o* * ****k on t** n*m*sp*** in w*i** * [R***r*n***r*nt](*ttps://**t*w*y-*pi.si*s.k*s.io/*pi-typ*s/r***r

Reasoning

T** vuln*r**ility st*ms *rom improp*r n*m*sp*** v*li**tion w**n **n*lin* R***r*n***r*nts in t** **t*w*y *PI impl*m*nt*tion. K*y in*i**tors: *. T** *V* **s*ription *xpli*itly m*ntions missin* n*m*sp*** ****ks on R***r*n***r*nt *r**tion *. **t*w*y *PI'