Crafted object type names can cause directory traversal in Kubernetes.
Object names are not validated before being passed to etcd. This allows attackers to write arbitrary files via a crafted object name, hence causing directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0.
{ "review_status": "REVIEWED", "url": "https://pkg.go.dev/vuln/GO-2022-0701" }
{ "imports": [ { "symbols": [ "BeforeCreate" ], "path": "k8s.io/kubernetes/pkg/api/rest" }, { "symbols": [ "NamespaceKeyFunc" ], "path": "k8s.io/kubernetes/pkg/registry/generic/etcd" }, { "symbols": [ "NamespaceKeyFunc", "NoNamespaceKeyFunc" ], "path": "k8s.io/kubernetes/pkg/api/storage" }, { "symbols": [ "NewREST" ], "path": "k8s.io/kubernetes/pkg/registry/namespace/etcd" }, { "symbols": [ "NewREST" ], "path": "k8s.io/kubernetes/pkg/registry/node/etcd" }, { "symbols": [ "NewREST" ], "path": "k8s.io/kubernetes/pkg/registry/persistentvolume/etcd" } ] }