GHSA-6qfg-8799-r575

Suggest an improvement
Source
https://github.com/advisories/GHSA-6qfg-8799-r575
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-6qfg-8799-r575/GHSA-6qfg-8799-r575.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6qfg-8799-r575
Aliases
Published
2021-05-18T15:30:07Z
Modified
2023-11-08T04:01:00.293035Z
Severity
  • CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
Summary
Kubernetes kubectl cp Vulnerable to Symlink Attack
Details

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

References

Affected packages

Go / k8s.io/kubernetes

Package

Name
k8s.io/kubernetes
Purl
pkg:golang/k8s.io/kubernetes

Affected ranges

Type
SEMVER
Events
Introduced
1.13.10
Fixed
1.13.11

Go / k8s.io/kubernetes

Package

Name
k8s.io/kubernetes
Purl
pkg:golang/k8s.io/kubernetes

Affected ranges

Type
SEMVER
Events
Introduced
1.14.6
Fixed
1.14.7

Go / k8s.io/kubernetes

Package

Name
k8s.io/kubernetes
Purl
pkg:golang/k8s.io/kubernetes

Affected ranges

Type
SEMVER
Events
Introduced
1.15.3
Fixed
1.16.0