- Description
- The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
- Source
- jordan@liggitt.net
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.7
- Impact score
- 3.6
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8E20ECB8-B503-4DB2-BCDB-D28E53523C9E",
"versionEndExcluding": "1.13.11",
"versionStartIncluding": "1.13.0"
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CFCC3601-5C5D-4304-AE8E-E75F262A5CC6",
"versionEndExcluding": "1.14.7",
"versionStartIncluding": "1.14.0"
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7A4A079B-AA15-49F4-9861-D99D6FAEE758",
"versionEndExcluding": "1.15.4",
"versionStartIncluding": "1.15.0"
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:1.1-1.12:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DF182631-B804-429A-A1EC-B9BCE60FDA93"
}
],
"operator": "OR"
}
]
}
]