<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Kiali – Security Bulletins</title>
    <link>https://v2-24.kiali.io/news/security-bulletins/</link>
    <description>Recent content in Security Bulletins on Kiali</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    
	  <atom:link href="https://v2-24.kiali.io/news/security-bulletins/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>News: KIALI-SECURITY-003 - Installation into ad-hoc namespaces</title>
      <link>https://v2-24.kiali.io/news/security-bulletins/kiali-security-003/</link>
      <pubDate>Tue, 11 May 2021 11:00:00 -0600</pubDate>
      
      <guid>https://v2-24.kiali.io/news/security-bulletins/kiali-security-003/</guid>
      <description>
        
        
        &lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Disclosure date&lt;/strong&gt;: May 11, 2021&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Releases&lt;/strong&gt;: prior to 1.33.0&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Impact Score&lt;/strong&gt;: &lt;a href=&#34;https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L&amp;amp;version=3.1&#34;&gt;6.6 - AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A vulnerability was found in the Kiali Operator allowing installation of a specified image into any namespace.&lt;/p&gt;
&lt;p&gt;Kiali users are exposed to this vulnerability if all the following conditions are met:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Kiali operator is used for installation.&lt;/li&gt;
&lt;li&gt;Kiali CR was edited to install an image into an unapproved namespace.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This vulnerability is filed as
&lt;a href=&#34;https://access.redhat.com/security/cve/CVE-2021-3495&#34;&gt;CVE-2021-3495&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;mitigation&#34;&gt;Mitigation&lt;/h2&gt;
&lt;p&gt;If you can update:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Update to Kiali Operator v1.33.0 or later.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you can not update:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ensure only trusted individuals can create or edit a Kiali CRs (resources of kind &amp;ldquo;kiali&amp;rdquo;).&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>News: KIALI-SECURITY-002 - Authentication bypass when using the OpenID login strategy</title>
      <link>https://v2-24.kiali.io/news/security-bulletins/kiali-security-002/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://v2-24.kiali.io/news/security-bulletins/kiali-security-002/</guid>
      <description>
        
        
        &lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Disclosure date&lt;/strong&gt;: March 5, 2021&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Releases&lt;/strong&gt;: 1.26.0, 1.26.1, 1.26.2, 1.27.0, 1.28.0, 1.28.1, 1.29.0, 1.29.1, 1.30.0&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Impact Score&lt;/strong&gt;: &lt;a href=&#34;https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:X/RC:C&amp;amp;version=3.1&#34;&gt;7.0 - AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:X/RC:C&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A vulnerability was found in Kiali allowing an attacker to bypass the
authentication mechanism. The vulnerability lets an attacker build forged
credentials and use them to gain unauthorized access to Kiali.&lt;/p&gt;
&lt;p&gt;Kiali users are exposed to this vulnerability if all the following conditions are met:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Kiali is setup with the &lt;code&gt;openid&lt;/code&gt; authentication strategy.&lt;/li&gt;
&lt;li&gt;As a result of configurations in both Kiali and your OpenID server, Kiali uses the
&lt;em&gt;implicit flow&lt;/em&gt; of the OpenID specification to negotiate authentication.&lt;/li&gt;
&lt;li&gt;Kiali is setup with RBAC turned off.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This vulnerability is filed as
&lt;a href=&#34;https://access.redhat.com/security/cve/CVE-2021-20278&#34;&gt;CVE-2021-20278&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;mitigation&#34;&gt;Mitigation&lt;/h2&gt;
&lt;p&gt;If you can update:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Update to Kiali v1.31.0 or later.&lt;/li&gt;
&lt;li&gt;If you need an earlier version, only Kiali 1.26.3 and 1.29.2 are fixed.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you are locked with an older version of Kiali, you have three options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configure Kiali to use the &lt;em&gt;authorization code&lt;/em&gt; flow of the OpenID specification; or&lt;/li&gt;
&lt;li&gt;Configure Kiali to use the &lt;em&gt;implicit flow&lt;/em&gt; of the OpenID specification &lt;em&gt;and&lt;/em&gt; enable RBAC; or&lt;/li&gt;
&lt;li&gt;Configure Kiali to use any of the other available authentication mechanisms.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>News: KIALI-SECURITY-001 - Authentication bypass using forged credentials</title>
      <link>https://v2-24.kiali.io/news/security-bulletins/kiali-security-001/</link>
      <pubDate>Tue, 24 Mar 2020 11:00:00 -0600</pubDate>
      
      <guid>https://v2-24.kiali.io/news/security-bulletins/kiali-security-001/</guid>
      <description>
        
        
        &lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Disclosure date&lt;/strong&gt;: March 25, 2020&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Releases&lt;/strong&gt;: 0.4.0 to 1.15.0&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Impact Score&lt;/strong&gt;: &lt;a href=&#34;https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H&amp;amp;version=3.1&#34;&gt;9.4 - AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A vulnerability was found in Kiali allowing an attacker to bypass the
authentication mechanism. Currently, Kiali has four authentication mechanisms:
&lt;em&gt;login, token, openshift&lt;/em&gt; and &lt;em&gt;ldap&lt;/em&gt;. All are vulnerable.&lt;/p&gt;
&lt;p&gt;The vulnerability lets an attacker build forged credentials and use them to
gain unauthorized access to Kiali.&lt;/p&gt;
&lt;p&gt;Additionally, it was found that Kiali credentials were not being validated
properly. Depending on the authentication mechanism configured in Kiali, this
could facilitate unauthorized access into Kiali with forged and/or invalid
credentials.&lt;/p&gt;
&lt;p&gt;These vulnerabilities are filed as
&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1762&#34;&gt;CVE-2020-1762&lt;/a&gt;
and
&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1764&#34;&gt;CVE-2020-1764&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;detection&#34;&gt;Detection&lt;/h2&gt;
&lt;p&gt;Use the following bash script to check if you are vulnerable:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;KIALI_VERSION=$(kubectl get pods -n istio-system -l app=kiali -o yaml | sed -n &amp;#39;s/^.*image: .*:v\(.*\)$/\1/p&amp;#39; | sort -u)
kubectl get deploy kiali -n istio-system -o yaml | grep -q LOGIN_TOKEN_SIGNING_KEY
TEST_KEY_ENV=$?
kubectl get cm kiali -n istio-system -o yaml | grep signing_key | grep -vq kiali
TEST_KEY_CFG=$?
VERSION_ENTRIES=(${KIALI_VERSION//./ })
echo &amp;#34;Your Kiali version found: ${KIALI_VERSION}&amp;#34;
[ ${VERSION_ENTRIES[0]} -lt &amp;#34;1&amp;#34; ] || ([ ${VERSION_ENTRIES[0]} -eq &amp;#34;1&amp;#34; ] &amp;amp;&amp;amp; (\
  [ ${VERSION_ENTRIES[1]} -lt &amp;#34;15&amp;#34; ] || ([ ${VERSION_ENTRIES[1]} -eq &amp;#34;15&amp;#34; ] &amp;amp;&amp;amp; ( \
  [ ${VERSION_ENTRIES[2]} -le &amp;#34;0&amp;#34; ])))) &amp;amp;&amp;amp; echo &amp;#34;Your Kiali version is vulnerable&amp;#34;
[ $TEST_KEY_ENV -eq 1 ] &amp;amp;&amp;amp; [ $TEST_KEY_CFG -eq 1 ] &amp;amp;&amp;amp; echo &amp;#34;Your Kiali configuration looks vulnerable&amp;#34;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The script output will be similar to this:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Your Kiali version found: 1.14.0
Your Kiali version is vulnerable
Your Kiali configuration looks vulnerable
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;mitigation&#34;&gt;Mitigation&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Update to Kiali 1.15.1 or later.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Alternatively, if you cannot update to version 1.15.1, mitigation is possible by
&lt;a href=&#34;https://github.com/kiali/kiali/blob/a660a80b2add1fd2fcfb5662c63824ca1dff95b9/operator/deploy/kiali/kiali_cr.yaml#L602-L608&#34;&gt;setting a secure signing key&lt;/a&gt;
when deploying Kiali. If you installed via Kiali operator, you could use the following bash script:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;SIGN_KEY=$(chars=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890; for i in {1..20}; do echo -n &amp;#34;${chars:RANDOM%${#chars}:1}&amp;#34;; done; echo)
kubectl get kiali -n $(kubectl get kiali --all-namespaces --no-headers -o custom-columns=NS:.metadata.namespace) -o yaml | sed &amp;#34;s/spec:/spec:\n    login_token:\n      signing_key: $SIGN_KEY/&amp;#34; | kubectl apply -f -
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If you installed via Istio helm charts or &lt;code&gt;istioctl&lt;/code&gt; command, you could use the following bash script:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;KIALI_INSTALL_NAMESPACE=istio-system
SIGN_KEY=$(chars=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890; for i in {1..20}; do echo -n &amp;#34;${chars:RANDOM%${#chars}:1}&amp;#34;; done; echo)
kubectl get cm kiali -n $KIALI_INSTALL_NAMESPACE -o yaml | sed &amp;#34;s/server:/login_token:\\n      signing_key: $SIGN_KEY\\n    server:/&amp;#34; | kubectl apply -f -
kubectl delete pod -l app=kiali -n $KIALI_INSTALL_NAMESPACE
&lt;/code&gt;&lt;/pre&gt;
      </description>
    </item>
    
  </channel>
</rss>
