| id: GO-TEST-ID |
| modules: |
| - module: github.com/kubernetes/kubernetes |
| versions: |
| - introduced: 1.13.10 |
| fixed: 1.13.11 |
| - introduced: 1.14.6 |
| fixed: 1.14.7 |
| vulnerable_at: 1.14.7-beta.0 |
| packages: |
| - package: github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp |
| - module: k8s.io/kubernetes |
| versions: |
| - introduced: 1.15.3 |
| fixed: 1.16.0 |
| vulnerable_at: 1.16.0-rc.2 |
| packages: |
| - package: k8s.io/kubernetes/pkg/kubectl/cmd/cp |
| summary: Symlink Attack |
| description: |- |
| The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to |
| 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar |
| output of a malicious container to place a file outside of the destination |
| directory specified in the kubectl cp invocation. This could be used to allow an |
| attacker to place a nefarious file using a symlink, outside of the destination |
| tree. |
| cves: |
| - CVE-2019-11251 |
| ghsas: |
| - GHSA-6qfg-8799-r575 |
| references: |
| - advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11251 |
| - report: https://github.com/kubernetes/kubernetes/issues/87773 |
| - fix: https://github.com/kubernetes/kubernetes/pull/82143 |
| - web: https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ |
| notes: |
| - lint: 'summary: must contain an affected module or package path (e.g. "github.com/kubernetes/kubernetes")' |