Summary Multiple vulnerabilities in Kubernetes used by IBM InfoSphere Information Server were addressed. Vulnerability Details ** CVEID: CVE-2020-8562 DESCRIPTION: **Kubernetes could allow a remote authenticated attacker to obtain sensitive information, caused by a time-of-check time-of-use (TOCTOU) race condition flaw in the API Server proxy. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain access to private networks on the Kubernetes control plane components. CVSS Base score: 2.2 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/201273 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N) ** CVEID: CVE-2021-25743 DESCRIPTION: **Kubernetes could allow a remote authenticated attacker to bypass security restrictions, caused by improper filtering of ANSI escape characters in kubectl. By sending a specially-crafted input, an attacker could exploit this vulnerability to hide all the events, changing the title of the terminal window, and spoof the data. CVSS Base score: 3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/216852 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N) Affected Products and Versions Affected Product(s)| Version(s) —|— InfoSphere Information Server| 11.7 Remediation/Fixes Product| VRMF| APAR| Remediation —|—|—|— InfoSphere Information Server, InfoSphere Information Server on…Read More
