Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-kgvu-q3dc-8khe
Summary
Confused Deputy in Kubernetes
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Aliases
0
alias CVE-2020-8561
1
alias GHSA-74j8-88mm-7496
Fixed_packages
0
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/kube-apiserver@1.23.0-1
purl pkg:alpm/archlinux/kube-apiserver@1.23.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kgvu-q3dc-8khe
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/kube-apiserver@1.23.0-1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8561.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8561
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40081
published_at 2026-04-04T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40056
published_at 2026-04-08T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40055
published_at 2026-04-02T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40002
published_at 2026-04-07T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40046
published_at 2026-04-18T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-16T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40025
published_at 2026-04-13T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40044
published_at 2026-04-12T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.4008
published_at 2026-04-11T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.4007
published_at 2026-04-09T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.39908
published_at 2026-04-01T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.40577
published_at 2026-04-21T12:55:00Z
12
value 0.00188
scoring_system epss
scoring_elements 0.40476
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8561
3
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
4
reference_url https://github.com/kubernetes/kubernetes/issues/104720
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/104720
5
reference_url https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8561
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8561
7
reference_url https://security.netapp.com/advisory/ntap-20211014-0002
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20211014-0002
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2000366
reference_id 2000366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2000366
9
reference_url https://security.archlinux.org/AVG-2394
reference_id AVG-2394
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2394
Weaknesses
0
cwe_id 441
name Unintended Proxy or Intermediary ('Confused Deputy')
description The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.
1
cwe_id 610
name Externally Controlled Reference to a Resource in Another Sphere
description The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
2
cwe_id 601
name URL Redirection to Untrusted Site ('Open Redirect')
description A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-kgvu-q3dc-8khe