Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Kyverno's Improper JMESPath Variable Evaluation Leads to Denial of Service
Vulnerability Description
Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Vulnerability Type
输入验证不恰当
Vulnerability Title
Kyverno 安全漏洞
Vulnerability Description
Kyverno是Kyverno开源的一个为 Kubernetes 设计的策略引擎。 Kyverno 1.14.1及之前版本和2025.6.0-rc1至2025.6.3版本存在安全漏洞,该漏洞源于JMESPath变量处理不当,可能导致拒绝服务攻击。
CVSS Information
N/A
Vulnerability Type
N/A