CVE-2022-45933
CRITICAL EXPLOITED NUCLEIKubeview < 0.1.31 - Missing Authentication
Title source: ruleDescription
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
Nuclei Templates (1)
KubeView <=0.1.31 - Information Disclosure
CRITICALVERIFIEDby For3stCo1d
Shodan:
http.title:"KubeView" || http.title:"kubeview" || http.favicon.hash:-379154636
FOFA:
icon_hash=-379154636 || title="kubeview"
Scores
CVSS v3
9.8
EPSS
0.9322
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
VulnCheck KEV
2023-11-25
CWE
CWE-306
Status
published
Products (2)
benc-uk/kubeview
0Go
kubeview_project/kubeview
< 0.1.31
Published
Nov 27, 2022
Tracked Since
Feb 18, 2026