A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.
No PoCs from references.
- https://github.com/0xT11/CVE-POC
- https://github.com/43622283/awesome-cloud-native-security
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/Metarget/metarget
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/atwilsecurity/k8s-Security
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dli408097/k8s-security
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/knqyf263/CVE-2020-10749
- https://github.com/magnologan/awesome-k8s-security
- https://github.com/neargle/re0-kubernetes-sec-archive
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/reni2study/Cloud-Native-Security2
- https://github.com/rosyrut/K8S-Security
- https://github.com/soosmile/POC
- https://github.com/sunilbennur/kubernetes-Security-master