← Back to CVEs
CVE-2023-1065
MEDIUM6.5
Description
This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case).
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/28/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
snyk:kubernetes_monitor
Weaknesses (CWE)
CWE-287CWE-287
References
https://github.com/snyk/kubernetes-monitor(report@snyk.io)
https://github.com/snyk/kubernetes-monitor/commit/5b9a7821680bbfb6c4a900ab05d898ce2b2cc157(report@snyk.io)
https://github.com/snyk/kubernetes-monitor/pull/1275(report@snyk.io)
https://github.com/snyk/kubernetes-monitor(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/snyk/kubernetes-monitor/commit/5b9a7821680bbfb6c4a900ab05d898ce2b2cc157(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/snyk/kubernetes-monitor/pull/1275(af854a3a-2127-422b-91ae-364da2661108)
https://snyk.io/blog/api-auth-vuln-snyk-kubernetes-cve-2023-1065/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.