Vulnerability Details CVE-2021-4178
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 18.7%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2021-4178
-
cpe:2.3:a:redhat:a-mq_streams:2.0.1
-
cpe:2.3:a:redhat:build_of_quarkus:2.2.5
-
cpe:2.3:a:redhat:descision_manager:7.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.0.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.0.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.0.2
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.1.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.1.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.10.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.10.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.11.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.11.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.2.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.2.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.3.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.3.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.5.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.6.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.7.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.7.1
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.7.2
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.7.3
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.8.0
-
cpe:2.3:a:redhat:fabric8-kubernetes:5.9.0
-
cpe:2.3:a:redhat:fuse:7.11
-
cpe:2.3:a:redhat:integration_camel_k:-
-
cpe:2.3:a:redhat:integration_camel_quarkus:2.2.1
-
cpe:2.3:a:redhat:openshift_application_runtimes:-
-
cpe:2.3:a:redhat:process_automation:7.0