Impact: Moderate Public Date: 2019-03-28 CWE: CWE-59 Bugzilla: 1685213: CVE-2019-1002101 kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp` A flaw was found in Kubernetes via the mishandling of symlinks when copying files from a running container. An attacker could exploit this by convincing a user to use `kubectl cp` or `oc cp` with a malicious container, allowing for arbitrary files to be overwritten on the host machine.
Find out more about CVE-2019-1002101 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects Kubernetes starting from version 1.9. OpenShift Container Platform (OCP) versions 3.9 and later are also affected.
This issue did not affect the version of Kubernetes(embedded in heketi) shipped with Red Hat Gluster Storage 3 as it does not contain the vulnerable code.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 5.3 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | High |
Availability Impact | None |
Platform | Package | State |
---|---|---|
Red Hat OpenShift Container Platform 3.9 | atomic-openshift | Affected |
Red Hat OpenShift Container Platform 3.7 | atomic-openshift | Not affected |
Red Hat OpenShift Container Platform 3.6 | atomic-openshift | Not affected |
Red Hat OpenShift Container Platform 3.5 | atomic-openshift | Not affected |
Red Hat OpenShift Container Platform 3.4 | atomic-openshift | Not affected |
Red Hat OpenShift Container Platform 3.11 | atomic-openshift | Affected |
Red Hat OpenShift Container Platform 3.10 | atomic-openshift | Affected |
Red Hat Gluster Storage 3 | heketi | Not affected |