Moderate severityNVD Advisory· Published Feb 3, 2020· Updated Aug 4, 2024
kubectl cp allows symlink directory traversal
CVE-2019-11251
Description
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
k8s.io/kubernetesGo | >= 1.13.10, < 1.13.11 | 1.13.11 |
k8s.io/kubernetesGo | >= 1.14.6, < 1.14.7 | 1.14.7 |
k8s.io/kubernetesGo | >= 1.15.3, < 1.16.0 | 1.16.0 |
Affected products
1- Range: prior to 1.13.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-6qfg-8799-r575ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-11251ghsaADVISORY
- github.com/kubernetes/kubernetes/issues/87773ghsax_refsource_CONFIRMWEB
- github.com/kubernetes/kubernetes/pull/82143ghsaWEB
- groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJghsamailing-listx_refsource_MLISTWEB
News mentions
0No linked articles in our index yet.