6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
github.com/kubernetes/kubernetes is vulnerable to directory traversal. The vulnerability exists in the untarAll
function due to improper handling of symlinks which allows a remote attacker to replace files on a users workstation using kubectl cp
command.
github.com/kubernetes/kubernetes/commit/8649b4d9ebad4e3b6ae01619585237ec5863b92b
github.com/kubernetes/kubernetes/commit/8db8423eea628d3696157cf8d3fbc261781a4302
github.com/kubernetes/kubernetes/commit/8f8227f90d540dfb0f01efc3fd1f3eff87bf596a
github.com/kubernetes/kubernetes/pull/76788
groups.google.com/forum/#!topic/kubernetes-security-announce/NLs2TGbfPdo
seclists.org/oss-sec/2019/q2/194
security.netapp.com/advisory/ntap-20190919-0003/
www.sourceclear.com/vulnerability-database/security/directory-traversal/go/sid-13572
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N