CVE Vulnerabilities

CVE-2020-8564

Insertion of Sensitive Information into Log File

Published: Dec 07, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

Weakness

The product writes sensitive information to a log file.

Affected Software

NameVendorStart VersionEnd Version
KubernetesKubernetes1.17.0 (including)1.17.13 (excluding)
KubernetesKubernetes1.18.0 (including)1.18.10 (excluding)
KubernetesKubernetes1.19.0 (including)1.19.3 (excluding)
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-0:3.11.501-1.git.0.f8c4746.el7*
Red Hat OpenShift Container Platform 4.4RedHatopenshift4/ose-docker-builder:v4.4.0-202101261542.p0*
Red Hat OpenShift Container Platform 4.5RedHatopenshift4/ose-docker-builder:v4.5.0-202012050338.p0*
Red Hat OpenShift Container Platform 4.6RedHatopenshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7*
Red Hat OpenShift Container Platform 4.6RedHatopenshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7*
Red Hat OpenShift Container Platform 4.6RedHatopenshift4/ose-docker-builder:v4.6.0-202012050130.p0*
Red Hat OpenShift Container Platform 4.6RedHatopenshift4/ose-hyperkube:v4.6.0-202101160934.p0*
KubernetesUbuntufocal*
KubernetesUbuntugroovy*
KubernetesUbuntuhirsute*
KubernetesUbuntuimpish*
KubernetesUbuntukinetic*
KubernetesUbuntulunar*
KubernetesUbuntumantic*
KubernetesUbuntuoracular*

Potential Mitigations

References