In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller managers log. This affects < v1.19.3.
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kubernetes | Kubernetes | * | 1.19.3 (excluding) |
Red Hat OpenShift Container Platform 4.6 | RedHat | openshift-0:4.6.0-202012051246.p0.git.94231.efc9027.el7 | * |
Red Hat OpenShift Container Platform 4.7 | RedHat | openshift4/ose-hyperkube:v4.7.0-202102130115.p0 | * |
Kubernetes | Ubuntu | groovy | * |
Kubernetes | Ubuntu | hirsute | * |
Kubernetes | Ubuntu | impish | * |
Kubernetes | Ubuntu | kinetic | * |
Kubernetes | Ubuntu | lunar | * |
Kubernetes | Ubuntu | mantic | * |
While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for: