A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1923405 | Issue Tracking Vendor Advisory |
https://github.com/fabric8io/kubernetes-client/issues/2715 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2021-03-16 21:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-20218
Mitre link : CVE-2021-20218
CVE.ORG link : CVE-2021-20218
JSON object : View
Products Affected
redhat
- codeready_studio
- descision_manager
- jboss_fuse
- build_of_quarkus
- a-mq_online
- openshift_container_platform
- process_automation
- integration_camel_k
- kubernetes-client
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')