
Cloud Vulnerability DB
A community-led vulnerabilities database
Capsule, a multi-tenancy and policy-based framework for Kubernetes, contains a vulnerability (CVE-2024-39690) in version 0.7.0 and earlier where tenant-owners can exploit namespace permissions. The vulnerability was discovered and disclosed on August 20, 2024, affecting the core functionality of the Capsule framework (NVD, GitHub Advisory).
The vulnerability is classified with a CVSS v3.1 base score of 8.8 (HIGH) according to NIST, and 8.4 (HIGH) according to GitHub. The vulnerability is identified as CWE-863 (Incorrect Authorization). The technical issue allows tenant-owners with 'patch namespace' permissions to modify any arbitrary namespace that hasn't been claimed by a tenant (those without the ownerReference field) (NVD).
The vulnerability enables tenant-owners to gain unauthorized control of namespaces, including potentially sensitive system namespaces. This could lead to a significant security breach as attackers could take over critical system components and potentially compromise the entire Kubernetes cluster (GitHub Advisory).
A patch has been implemented in the Capsule repository to address this vulnerability. The fix involves additional validation checks for namespace ownership and modifications to the webhook handler for namespace updates (Capsule Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."