Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-35165 (Medium) detected in aws-cdk-lib-2.13.0.tgz #2933

Closed
1 task
mend-for-github-com bot opened this issue Jun 26, 2023 · 0 comments · Fixed by #2948
Closed
1 task

CVE-2023-35165 (Medium) detected in aws-cdk-lib-2.13.0.tgz #2933

mend-for-github-com bot opened this issue Jun 26, 2023 · 0 comments · Fixed by #2948
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource untriaged

Comments

@mend-for-github-com
Copy link
Contributor

CVE-2023-35165 - Medium Severity Vulnerability

Vulnerable Library - aws-cdk-lib-2.13.0.tgz

Version 2 of the AWS Cloud Development Kit library

Library home page: https://registry.npmjs.org/aws-cdk-lib/-/aws-cdk-lib-2.13.0.tgz

Path to dependency file: /release/staging-resources-cdk/package.json

Path to vulnerable library: /release/staging-resources-cdk/node_modules/aws-cdk-lib/package.json

Dependency Hierarchy:

  • aws-cdk-lib-2.13.0.tgz (Vulnerable Library)

Found in HEAD commit: 90bdaa7e7833bdd504c817e49d4434b4d8880f56

Found in base branch: main

Vulnerability Details

AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages aws-cdk-lib 2.0.0 until 2.80.0 and @aws-cdk/aws-eks 1.57.0 until 1.202.0, eks.Cluster and eks.FargateCluster constructs create two roles, CreationRole and default MastersRole, that have an overly permissive trust policy.

The first, referred to as the CreationRole, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g KubernetesManifest, HelmChart, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected.

The second, referred to as the default MastersRole, is provisioned only if the mastersRole property isn't provided and has permissions to execute kubectl commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected.

The issue has been fixed in @aws-cdk/aws-eks v1.202.0 and aws-cdk-lib v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the default MastersRole, use the mastersRole property to explicitly provide a role.

Publish Date: 2023-06-23

URL: CVE-2023-35165

CVSS 3 Score Details (6.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-rx28-r23p-2qc3

Release Date: 2023-06-23

Fix Resolution: 2.80.0


  • Check this box to open an automated fix PR
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource untriaged
Projects
Archived in project
Development

Successfully merging a pull request may close this issue.

0 participants