Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
The product does not properly verify that a critical resource is owned by the proper entity.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Kubernetes | Kubernetes | * | * | 
| Red Hat OpenShift Container Platform 3.11 | RedHat | atomic-openshift-0:3.11.374-1.git.0.ebd3ee9.el7 | * | 
| Kubernetes | Ubuntu | focal | * | 
| Kubernetes | Ubuntu | groovy | * | 
| Kubernetes | Ubuntu | hirsute | * | 
| Kubernetes | Ubuntu | impish | * | 
| Kubernetes | Ubuntu | kinetic | * | 
| Kubernetes | Ubuntu | lunar | * | 
| Kubernetes | Ubuntu | mantic | * | 
| Kubernetes | Ubuntu | oracular | * |