CVE-2019-11251
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
03/02/2020
Last modified:
06/02/2020
Description
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
Impact
Base Score 3.x
5.70
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* | 1.13.0 (including) | 1.13.11 (excluding) |
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* | 1.14.0 (including) | 1.14.7 (excluding) |
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* | 1.15.0 (including) | 1.15.4 (excluding) |
cpe:2.3:a:kubernetes:kubernetes:1.1-1.12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page