{"containers":{"cna":{"affected":[{"product":"Kubernetes","vendor":"Kubernetes","versions":[{"status":"affected","version":"prior to 1.16"}]}],"datePublic":"2019-08-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected."}],"metrics":[{"cvssV3_0":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532: Inclusion of Sensitive Information in Log Files","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-10-16T08:06:12.000Z","orgId":"a6081bf6-c852-4425-ad4f-a67919267565","shortName":"kubernetes"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/kubernetes/kubernetes/issues/81114"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20190919-0003/"},{"name":"RHSA-2019:4052","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:4052"},{"name":"RHSA-2019:4087","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:4087"},{"name":"[oss-security] 20201016 Kubernetes: Multiple secret leaks when verbose logging is enabled","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2020/10/16/2"}],"source":{"defect":["https://github.com/kubernetes/kubernetes/issues/81114"],"discovery":"EXTERNAL"},"title":"Kubernetes client-go logs authorization headers at debug verbosity levels","workarounds":[{"lang":"en","value":"lower log verbosity levels to <= 6"}],"x_generator":{"engine":"Vulnogram 0.0.7"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"","ASSIGNER":"security@kubernetes.io","DATE_PUBLIC":"2019-08-12","ID":"CVE-2019-11250","STATE":"PUBLIC","TITLE":"Kubernetes client-go logs authorization headers at debug verbosity levels"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Kubernetes","version":{"version_data":[{"version_value":"prior to 1.16"}]}}]},"vendor_name":"Kubernetes"}]}},"configuration":[],"credit":[],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected."}]},"exploit":[],"generator":{"engine":"Vulnogram 0.0.7"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532: Inclusion of Sensitive Information in Log Files"}]}]},"references":{"reference_data":[{"name":"https://github.com/kubernetes/kubernetes/issues/81114","refsource":"CONFIRM","url":"https://github.com/kubernetes/kubernetes/issues/81114"},{"name":"https://security.netapp.com/advisory/ntap-20190919-0003/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20190919-0003/"},{"name":"RHSA-2019:4052","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:4052"},{"name":"RHSA-2019:4087","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:4087"},{"name":"[oss-security] 20201016 Kubernetes: Multiple secret leaks when verbose logging is enabled","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2020/10/16/2"}]},"solution":[],"source":{"advisory":"","defect":["https://github.com/kubernetes/kubernetes/issues/81114"],"discovery":"EXTERNAL"},"work_around":[{"lang":"en","value":"lower log verbosity levels to <= 6"}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T22:48:09.024Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/kubernetes/kubernetes/issues/81114"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20190919-0003/"},{"name":"RHSA-2019:4052","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:4052"},{"name":"RHSA-2019:4087","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:4087"},{"name":"[oss-security] 20201016 Kubernetes: Multiple secret leaks when verbose logging is enabled","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2020/10/16/2"}]}]},"cveMetadata":{"assignerOrgId":"a6081bf6-c852-4425-ad4f-a67919267565","assignerShortName":"kubernetes","cveId":"CVE-2019-11250","datePublished":"2019-08-29T00:40:43.341Z","dateReserved":"2019-04-17T00:00:00.000Z","dateUpdated":"2024-09-17T02:06:55.457Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}