-
CVSS Score
-The vulnerability stemmed from overprivileged RBAC configurations. Key indicators are: 1) The commit diff shows added resourceNames restrictions in cluster_role.yaml and role.yaml, indicating previous wildcard delete permissions. 2) The migration_test.go changes verify cleanup of specific resources, confirming the previous broad-scope deletion capability. 3) The np_syncer_resources.go modifications demonstrate the code was previously deleting resources without name constraints. The combination of permissive RBAC rules and deletion logic without resource name restrictions created the vulnerability surface.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/submariner-io/submariner-operator | go | >= 0.16.0-m0, < 0.16.4 | 0.16.4 |
| github.com/submariner-io/submariner-operator | go | >= 0.17.0-m0, < 0.17.2 | 0.17.2 |
| github.com/submariner-io/submariner-operator | go | < 0.15.4 | 0.15.4 |
| github.com/submariner-io/submariner-operator | go | >= 0.18.0-m0, < 0.18.0-rc0 | 0.18.0-rc0 |