Am I vulnerable?
All kcp instances that allow untrusted users to create and use APIExports are affected by this vulnerability.
Affected versions
All versions prior to 0.26.3 and 0.27.0 are affected by this vulnerability.
How to mitigate this issue?
A fix for this issue has been identified and has been published with kcp 0.26.3 and 0.27.0. The only option to fully mitigate this issue is to upgrade to one of these versions, and we strongly recommend doing that as soon as possible.
Workarounds
For users unable to upgrade to one of the patched versions, the following guidance can be given:
- Minimise the set of people with apiexport/content sub-resource access to APIExport resources. Be aware that this has to apply to all workspaces to be effective.
- Filter incoming requests in a reverse proxy with a similar logic as the authorizer added in the referenced pull request.
References
For additional details, please see the
security advisory on GitHub[1].
Acknowledgements
We would like to thank Marko Mudrinić (@xmudrii) from Kubermatic for discovering, reporting and contributing to fixing this issue.