Constallation has pods exposed to peers in VPC
High severity
GitHub Reviewed
Published
Apr 15, 2024
in
edgelesssys/constellation
•
Updated Jun 4, 2024
Package
Affected versions
< 2.16.3
Patched versions
2.16.3
Description
Published to the GitHub Advisory Database
Apr 15, 2024
Reviewed
Apr 15, 2024
Last updated
Jun 4, 2024
Impact
Cilium allows outside actors (
world
entity) to directly access pods with their internal pod IP, even if they are not exposed explicitly (e.g. viaLoadBalancer
). A pod that does not authenticate clients and that does not excludeworld
traffic via network policy may leak sensitive data to an attacker inside the cloud VPC.Patches
The issue has been patched in v2.16.3.
Workarounds
This network policy excludes all
world
traffic. It mitigates the problem, but will also block all desired external traffic. If vulnerable pods are known, a policy can be crafted to only firewall those instead (see also https://docs.cilium.io/en/stable/security/policy/language/#access-to-from-outside-cluster).References
The tracking bug for a Cilium-side fix is cilium/cilium#25626.
References