{"id":"CVE-2023-1260","details":"An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions \"update, patch\" the \"pods/ephemeralcontainers\" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.","aliases":["GHSA-92hx-3mh6-hc49"],"modified":"2026-05-04T08:43:39.583583Z","published":"2023-09-24T01:15:42.707Z","withdrawn":"2026-05-04T08:43:39.583583Z","related":["GHSA-92hx-3mh6-hc49"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3976"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:4093"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:4312"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:5008"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-1260"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231020-0010/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:4898"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-92hx-3mh6-hc49"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176267"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.11"}]},{"events":[{"introduced":"0"},{"last_affected":"4.12"}]},{"events":[{"introduced":"0"},{"last_affected":"4.13"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1260.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}