{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3893","assignerOrgId":"a6081bf6-c852-4425-ad4f-a67919267565","state":"PUBLISHED","assignerShortName":"kubernetes","dateReserved":"2023-07-24T20:24:06.695Z","datePublished":"2023-11-03T17:34:10.188Z","dateUpdated":"2025-02-13T17:02:36.473Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"csi-proxy","repo":"https://github.com/kubernetes-csi/csi-proxy","vendor":"Kubernetes","versions":[{"status":"affected","version":"v2.0.0-alpha.0"},{"lessThanOrEqual":"v1.1.2","status":"affected","version":"0","versionType":"semver"},{"status":"unaffected","version":"v2.0.0-alpha.1"},{"status":"unaffected","version":"v1.1.3"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"James Sturtevant"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Mark Rossetti"}],"datePublic":"2023-08-23T04:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A security issue was discovered in Kubernetes where a user that can \ncreate pods on Windows nodes running kubernetes-csi-proxy may be able to\n escalate to admin privileges on those nodes. Kubernetes clusters are \nonly affected if they include Windows nodes running \nkubernetes-csi-proxy.<br>"}],"value":"A security issue was discovered in Kubernetes where a user that can \ncreate pods on Windows nodes running kubernetes-csi-proxy may be able to\n escalate to admin privileges on those nodes. Kubernetes clusters are \nonly affected if they include Windows nodes running \nkubernetes-csi-proxy."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6081bf6-c852-4425-ad4f-a67919267565","shortName":"kubernetes","dateUpdated":"2023-12-21T22:06:31.726Z"},"references":[{"tags":["issue-tracking"],"url":"https://github.com/kubernetes/kubernetes/issues/119594"},{"tags":["mailing-list"],"url":"https://groups.google.com/g/kubernetes-security-announce/c/lWksE2BoCyQ"},{"url":"https://security.netapp.com/advisory/ntap-20231221-0004/"}],"source":{"discovery":"INTERNAL"},"title":"Kubernetes - csi-proxy - Insufficient input sanitization leads to privilege escalation","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:08:50.687Z"},"title":"CVE Program Container","references":[{"tags":["issue-tracking","x_transferred"],"url":"https://github.com/kubernetes/kubernetes/issues/119594"},{"tags":["mailing-list","x_transferred"],"url":"https://groups.google.com/g/kubernetes-security-announce/c/lWksE2BoCyQ"},{"url":"https://security.netapp.com/advisory/ntap-20231221-0004/","tags":["x_transferred"]}]}]}}