VYPR
Moderate severityNVD Advisory· Published Feb 3, 2020· Updated Aug 4, 2024

kubectl cp allows symlink directory traversal

CVE-2019-11251

Description

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
k8s.io/kubernetesGo
>= 1.13.10, < 1.13.111.13.11
k8s.io/kubernetesGo
>= 1.14.6, < 1.14.71.14.7
k8s.io/kubernetesGo
>= 1.15.3, < 1.16.01.16.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.