Vulnerability Report: GO-2022-0547
- CVE-2022-2385, GHSA-pp3f-98qg-5g75
- Affects: sigs.k8s.io/aws-iam-authenticator
- Published: Aug 21, 2024
- Unreviewed
aws-iam-authenticator allow-listed IAM identity may be able to modify their username, escalate privileges before v0.5.9 in sigs.k8s.io/aws-iam-authenticator
For detailed information about this vulnerability, visit https://github.com/advisories/GHSA-pp3f-98qg-5g75 or https://nvd.nist.gov/vuln/detail/CVE-2022-2385.
Affected Modules
-
PathGo Versions
-
before v0.5.9
Aliases
References
- https://github.com/advisories/GHSA-pp3f-98qg-5g75
- https://nvd.nist.gov/vuln/detail/CVE-2022-2385
- https://github.com/kubernetes-sigs/aws-iam-authenticator/commit/029d1dcf2ec8d662d9b1c21260bb197404bc8218
- https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472
- https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/469
- https://github.com/kubernetes-sigs/aws-iam-authenticator/releases/tag/v0.5.9
- https://groups.google.com/a/kubernetes.io/g/dev/c/EMxHpU-1ZYs
- https://vuln.go.dev/ID/GO-2022-0547.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.