blob: bd4b88e10cdff64c6a7f9ba896d05c2d80a1936c [file] [log] [blame]
id: GO-TEST-ID
modules:
- module: github.com/kubernetes/kubernetes
versions:
- introduced: 1.13.10
fixed: 1.13.11
- introduced: 1.14.6
fixed: 1.14.7
vulnerable_at: 1.14.7-beta.0
packages:
- package: github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp
- module: k8s.io/kubernetes
versions:
- introduced: 1.15.3
fixed: 1.16.0
vulnerable_at: 1.16.0-rc.2
packages:
- package: k8s.io/kubernetes/pkg/kubectl/cmd/cp
summary: Symlink Attack
description: |-
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to
1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar
output of a malicious container to place a file outside of the destination
directory specified in the kubectl cp invocation. This could be used to allow an
attacker to place a nefarious file using a symlink, outside of the destination
tree.
cves:
- CVE-2019-11251
ghsas:
- GHSA-6qfg-8799-r575
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11251
- report: https://github.com/kubernetes/kubernetes/issues/87773
- fix: https://github.com/kubernetes/kubernetes/pull/82143
- web: https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ
notes:
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/kubernetes/kubernetes")'