Loading HuntDB...

GHSA-6pcv-qqx4-mxm3

GitHub Security Advisory

Minikube RCE via DNS Rebinding

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.

Affected Packages

Go k8s.io/minikube
Affected versions: 0.3.0 (last affected: 0.29.0)

Related CVEs

Key Information

GHSA ID
GHSA-6pcv-qqx4-mxm3
Published
May 13, 2022 1:35 AM
Last Modified
July 21, 2023 9:47 PM
CVSS Score
7.5 /10
Primary Ecosystem
Go
Primary Package
k8s.io/minikube
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 14, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.