A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2034388 | issue tracking vendor advisory |
https://access.redhat.com/security/cve/CVE-2021-4178 | vendor advisory |
https://github.com/advisories/GHSA-98g7-rxmf-rrxm | third party advisory |
https://github.com/fabric8io/kubernetes-client/issues/3653 | issue tracking third party advisory |