Description
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0974 | The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree. |
Github GHSA |
GHSA-6qfg-8799-r575 | Kubernetes kubectl cp Vulnerable to Symlink Attack |
References
History
No history.
Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2024-08-04T22:48:09.005Z
Reserved: 2019-04-17T00:00:00.000Z
Link: CVE-2019-11251
No data.
Status : Modified
Published: 2020-02-03T16:15:11.140
Modified: 2024-11-21T04:20:48.460
Link: CVE-2019-11251
OpenCVE Enrichment
No data.
EUVD
Github GHSA