Loading HuntDB...

Broken Github Link Used in deployment docs of "github.com/kubernetes/kompose"

Medium
K
Kubernetes
Submitted None
Reported by codermak

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
Report Submission Form ## Summary: Kubernetes have a github project [github.com/kubernetes/kompose](https://github.com/kubernetes/kompose) In the project there is a doc which have installation steps In the steps, doc is referring to another github account repository to clone it and install. But the github account was not registered on github.com So I was able to takeover the account and host PoC ## Kubernetes Version: NA ## Component Version: NA ## Steps To Reproduce: 1. Go to https://github.com/kubernetes/kompose/blob/master/docs/maven-example.md 2. Search for `Clone the example project from GitHub` 3. You will see this clone command `$ git clone https://github.com/piyush1594/kompose-maven-example.git` 4. Try accessing the repository using the link https://github.com/piyush1594/kompose-maven-example you will see the takeover message. ## Supporting Material/References: - https://github.com/piyush1594/kompose-maven-example - https://github.com/kubernetes/kompose/blob/master/docs/maven-example.md {F1511533} ## Impact An attacker can takeover the github repository and host malicious code on it. When any user will follow the setup steps and clone the repository, it will end up pulling code from attacker's controlled repository. When user will try running further setup steps, it will end up executing attackers malicious code, which can lead to RCE.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic