UNCLASSIFIED - NO CUI

chore(findings): opensource/aws/karpenter/webhook

Summary

opensource/aws/karpenter/webhook has 95 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/aws/karpenter/webhook&tag=20221025&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2023-44487 Twistlock CVE Medium google.golang.org/grpc/internal/transport-v1.47.0 0.94522 true
CVE-2023-44487 Twistlock CVE Medium google.golang.org/grpc-v1.47.0 0.94522 true
CVE-2023-44487 Anchore CVE High stdlib-go1.19.2 0.94522 true
CVE-2023-45288 Twistlock CVE Medium net/http-1.19.2 0.59177 false
CVE-2023-45288 Anchore CVE High stdlib-go1.19.2 0.59177 false
CVE-2024-24784 Anchore CVE High stdlib-go1.19.2 0.01107 false
CVE-2024-24787 Anchore CVE Medium stdlib-go1.19.2 0.00714 false
CVE-2023-24531 Anchore CVE Critical stdlib-go1.19.2 0.00655 false
CVE-2023-24538 Twistlock CVE Critical html/template-1.19.2 0.00646 N/A
CVE-2023-24538 Anchore CVE Critical stdlib-go1.19.2 0.00646 N/A
CVE-2022-41717 Twistlock CVE Medium net/http-1.19.2 0.00413 N/A
CVE-2022-41717 Anchore CVE Medium stdlib-go1.19.2 0.00413 N/A
CVE-2023-45289 Twistlock CVE Low net/http-1.19.2 0.00348 false
CVE-2023-45289 Anchore CVE Medium stdlib-go1.19.2 0.00348 false
CVE-2024-24783 Twistlock CVE Low crypto/x509-1.19.2 0.00340 false
CVE-2024-24783 Anchore CVE Medium stdlib-go1.19.2 0.00340 false
CVE-2023-29405 Anchore CVE Critical stdlib-go1.19.2 0.00326 false
CVE-2023-29406 Twistlock CVE Medium net/http-1.19.2 0.00321 false
CVE-2023-29406 Anchore CVE Medium stdlib-go1.19.2 0.00321 false
CVE-2023-45290 Twistlock CVE Low net/textproto-1.19.2 0.00277 false
CVE-2023-45290 Anchore CVE Medium stdlib-go1.19.2 0.00277 false
CVE-2023-24540 Twistlock CVE Critical html/template-1.19.2 0.00243 false
CVE-2023-24540 Anchore CVE Critical stdlib-go1.19.2 0.00243 false
CVE-2024-24786 Twistlock CVE Medium google.golang.org/protobuf/encoding/protojson-v1.28.1 0.00238 false
CVE-2024-24786 Twistlock CVE Medium google.golang.org/protobuf/internal/encoding/json-v1.28.1 0.00238 false
CVE-2022-41723 Twistlock CVE High net/http-1.19.2 0.00229 N/A
CVE-2022-41723 Anchore CVE High stdlib-go1.19.2 0.00229 N/A
CVE-2024-24791 Twistlock CVE Low net/http-1.19.2 0.00200 false
CVE-2024-24791 Anchore CVE High stdlib-go1.19.2 0.00200 false
CVE-2023-45287 Twistlock CVE High crypto/tls-1.19.2 0.00185 false
CVE-2023-45287 Anchore CVE High stdlib-go1.19.2 0.00185 false
CVE-2024-24790 Twistlock CVE Critical net/netip-1.19.2 0.00171 false
CVE-2024-24790 Anchore CVE Critical stdlib-go1.19.2 0.00171 false
CVE-2023-39325 Twistlock CVE High net/http-1.19.2 0.00163 false
CVE-2024-24785 Twistlock CVE Low html/template-1.19.2 0.00154 false
CVE-2024-24785 Anchore CVE Medium stdlib-go1.19.2 0.00154 false
CVE-2024-45338 Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b 0.00121 false
CVE-2024-34156 Twistlock CVE Low encoding/gob-1.19.2 0.00108 false
CVE-2024-34156 Anchore CVE High stdlib-go1.19.2 0.00108 false
CVE-2023-29402 Anchore CVE Critical stdlib-go1.19.2 0.00091 false
CVE-2023-29409 Twistlock CVE Medium crypto/tls-1.19.2 0.00084 false
CVE-2023-29409 Anchore CVE Medium stdlib-go1.19.2 0.00084 false
CVE-2023-39323 Anchore CVE High stdlib-go1.19.2 0.00076 false
CVE-2024-34155 Anchore CVE Medium stdlib-go1.19.2 0.00070 false
CVE-2023-24536 Twistlock CVE High net/textproto-1.19.2 0.00066 N/A
CVE-2023-24536 Twistlock CVE High mime/multipart-1.19.2 0.00066 N/A
CVE-2023-24536 Anchore CVE High stdlib-go1.19.2 0.00066 N/A
CVE-2023-24539 Twistlock CVE High html/template-1.19.2 0.00065 false
CVE-2023-24539 Anchore CVE High stdlib-go1.19.2 0.00065 false
CVE-2023-39319 Twistlock CVE Medium html/template-1.19.2 0.00064 false
CVE-2023-39319 Anchore CVE Medium stdlib-go1.19.2 0.00064 false
CVE-2023-39318 Twistlock CVE Medium html/template-1.19.2 0.00064 false
CVE-2023-39318 Anchore CVE Medium stdlib-go1.19.2 0.00064 false
CVE-2023-29404 Anchore CVE Critical stdlib-go1.19.2 0.00061 false
CVE-2023-45285 Anchore CVE High stdlib-go1.19.2 0.00055 false
CVE-2024-34158 Anchore CVE High stdlib-go1.19.2 0.00054 false
CVE-2022-41725 Twistlock CVE High mime/multipart-1.19.2 0.00051 N/A
CVE-2022-41725 Anchore CVE High stdlib-go1.19.2 0.00051 N/A
CVE-2023-39326 Twistlock CVE Medium net/http/internal-1.19.2 0.00049 false
CVE-2023-39326 Anchore CVE Medium stdlib-go1.19.2 0.00049 false
CVE-2023-29400 Twistlock CVE High html/template-1.19.2 0.00048 false
CVE-2023-29400 Anchore CVE High stdlib-go1.19.2 0.00048 false
CVE-2023-24534 Twistlock CVE High net/textproto-1.19.2 0.00045 N/A
CVE-2023-24534 Anchore CVE High stdlib-go1.19.2 0.00045 N/A
CVE-2024-45336 Twistlock CVE Low net/http-1.19.2 0.00027 false
CVE-2024-45336 Anchore CVE Medium stdlib-go1.19.2 0.00027 false
CVE-2023-24532 Twistlock CVE Medium crypto/internal/nistec-1.19.2 0.00024 N/A
CVE-2023-24532 Anchore CVE Medium stdlib-go1.19.2 0.00024 N/A
CVE-2023-24537 Anchore CVE High stdlib-go1.19.2 0.00020 N/A
CVE-2025-22871 Twistlock CVE Low net/http/internal-1.19.2 0.00018 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.19.2 0.00018 false
CVE-2024-45341 Twistlock CVE Low crypto/x509-1.19.2 0.00018 false
CVE-2024-45341 Anchore CVE Medium stdlib-go1.19.2 0.00018 false
CVE-2022-41724 Twistlock CVE High crypto/tls-1.19.2 0.00016 N/A
CVE-2022-41724 Anchore CVE High stdlib-go1.19.2 0.00016 N/A
CVE-2024-24789 Anchore CVE Medium stdlib-go1.19.2 0.00012 false
CVE-2025-22866 Twistlock CVE Low crypto/internal/nistec-1.19.2 0.00009 false
CVE-2025-22866 Anchore CVE Medium stdlib-go1.19.2 0.00009 false
CVE-2023-29403 Twistlock CVE High runtime-1.19.2 0.00008 false
CVE-2023-29403 Anchore CVE High stdlib-go1.19.2 0.00008 false
GHSA-m425-mq94-257g Anchore CVE High google.golang.org/grpc-v1.47.0 None false
PRISMA-2022-0227 Twistlock CVE High github.com/emicklei/go-restful/v3-v3.8.0 N/A N/A
GHSA-xrjj-mj9h-534m Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-vvpx-j8f3-3w6h Anchore CVE High golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-vvgc-356p-c3xw Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-qxp5-gwg8-xv66 Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-qppj-fm5r-hxr3 Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-qppj-fm5r-hxr3 Anchore CVE Medium google.golang.org/grpc-v1.47.0 N/A N/A
GHSA-fxg5-wq6x-vr4w Anchore CVE High golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-8r3f-844c-mc37 Anchore CVE Medium google.golang.org/protobuf-v1.28.1 N/A N/A
GHSA-69ch-w2m2-3vjp Anchore CVE High golang.org/x/text-v0.3.7 N/A N/A
GHSA-69cg-p879-7622 Anchore CVE High golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-4v7x-pqxf-cx7m Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-4374-p667-p6c8 Anchore CVE High golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A
GHSA-2wrh-6pvc-2jm9 Anchore CVE Medium golang.org/x/net-v0.0.0-20220722155237-a158d28d115b N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/aws/karpenter/webhook&tag=20221025&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information