Inspektor Gadget Security Policies Can be Bypassed
Moderate severity
GitHub Reviewed
Published
May 5, 2025
in
inspektor-gadget/inspektor-gadget
•
Updated May 6, 2025
Package
Affected versions
>= 0.31.0, < 0.40.0
Patched versions
0.40.0
Description
Published to the GitHub Advisory Database
May 6, 2025
Reviewed
May 6, 2025
Last updated
May 6, 2025
Security policies like
allowed-gadgets
,disallow-pulling
,verify-image
can be bypassed by a malicious client.Impact
Users running
ig
in daemon mode or IG on Kubernetes that rely on any of the features mentioned above are vulnerable to this issue. In order to exploit this, the client needs access to the server, like the correct TLS certificates on theig daemon
case or access to the cluster in the Kubernetes case.Patches
The issue has been fixed in v0.40.0
Workarounds
There is not known workaround to fix it.
References