From 704c4309802b74cf682faddcf09fadcd088ed934 Mon Sep 17 00:00:00 2001 From: Amitai Cohen <71866656+korniko98@users.noreply.github.com> Date: Thu, 2 Nov 2023 13:45:15 +0200 Subject: [PATCH] Delete vulnerabilities/gcp-2022-009.yaml Duplicate of https://www.cloudvulndb.org/gke-autopilot-allowlist --- vulnerabilities/gcp-2022-009.yaml | 31 ------------------------------- 1 file changed, 31 deletions(-) delete mode 100644 vulnerabilities/gcp-2022-009.yaml diff --git a/vulnerabilities/gcp-2022-009.yaml b/vulnerabilities/gcp-2022-009.yaml deleted file mode 100644 index 655eeb9..0000000 --- a/vulnerabilities/gcp-2022-009.yaml +++ /dev/null @@ -1,31 +0,0 @@ -title: GKE Autopilot cluster privilege esclation -slug: gcp-2022-009 -cves: null -affectedPlatforms: -- GCP -affectedServices: -- GKE Autopilot -image: https://images.unsplash.com/photo-1628251721369-9bab0845261e?ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D&auto=format&fit=crop&w=3132&q=80 -severity: Medium -discoveredBy: - name: null - org: null - domain: null - twitter: null -disclosedAt: null -publishedAt: 2022/03/01 -exploitabilityPeriod: null -knownITWExploitation: null -summary: | - Some unexpected paths to access the node VM on GKE Autopilot clusters - could have been used to escalate privileges in the cluster. The mechanisms - for escalation were an overly loose set of third party policy exemptions, - a pair of overly privileged pods, and privileged service accounts - in the default namespace. -manualRemediation: | - None required -detectionMethods: null -contributor: https://github.com/ramimac -references: -- https://cloud.google.com/support/bulletins#gcp-2022-009 -- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-009