Vulnerabilities > CVE-2022-31055 - Unspecified vulnerability in Google Kctf
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Summary
kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.
Vulnerable Configurations
References
- https://github.com/google/kctf/commit/8cf050be974fcc2fd8aa136701f9a66f2b2a5202
- https://github.com/google/kctf/commit/8cf050be974fcc2fd8aa136701f9a66f2b2a5202
- https://github.com/google/kctf/pull/371
- https://github.com/google/kctf/pull/371
- https://github.com/google/kctf/security/advisories/GHSA-4g2v-6qc6-6jv5
- https://github.com/google/kctf/security/advisories/GHSA-4g2v-6qc6-6jv5