Miggo Logo

CVE-2023-47630: Attacker can cause Kyverno user to unintentionally consume insecure image

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.67379%
Published
11/14/2023
Updated
11/14/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/kyverno/kyvernogo< 1.10.51.10.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability fundamentally involves insufficient digest validation when resolving container images. Key evidence includes:

  1. The CWE-345 (Insufficient Verification of Data Authenticity) mapping
  2. Release notes explicitly mention adding 'a check for digest mismatch in verifyImages rules' (#8443)
  3. The attack vector requires registry compromise to manipulate digests, implying the vulnerability existed in the image resolution/verification flow
  4. Kyverno's own security advisory confirms the root cause was in their codebase (not Cosign)

These functions are core to Kyverno's image verification process, and the explicit mention of a digest mismatch check being added indicates these were the areas lacking proper validation prior to patching.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *oun* in Kyv*rno t**t *llow** *n *tt**k*r to *ontrol t** *i**st o* im***s us** *y Kyv*rno us*rs. T** issu* woul* r*quir* t** *tt**k*r to *ompromis* t** r**istry t**t t** Kyv*rno **t** t**ir im***s *rom. T** *tt**k*r *oul* t**n r*turn * v

Reasoning

T** vuln*r**ility *un**m*nt*lly involv*s insu**i*i*nt *i**st v*li**tion w**n r*solvin* *ont*in*r im***s. K*y *vi**n** in*lu**s: *. T** *W*-*** (Insu**i*i*nt V*ri*i**tion o* **t* *ut**nti*ity) m*ppin* *. R*l**s* not*s *xpli*itly m*ntion ***in* '* ****