A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| io.fabric8:kubernetes-client(Maven) | 5.0.0-beta-1 | 5.0.3 | N/A |
| io.fabric8:kubernetes-client(Maven) | 5.1.0 | 5.1.2 | N/A |
| io.fabric8:kubernetes-client(Maven) | 5.2.0 | 5.3.2 | N/A |
| io.fabric8:kubernetes-client(Maven) | 5.5.0 | 5.7.4 | N/A |
| io.fabric8:kubernetes-client(Maven) | 5.8.0 | 5.8.1 | N/A |
| io.fabric8:kubernetes-client(Maven) | 5.9.0 | 5.10.2 | N/A |
| io.fabric8:kubernetes-client(Maven) | 5.11.0 | 5.11.2 | N/A |
CVSS Metrics