4.3
CVSSv2

CVE-2019-11246

Published: 29/08/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions before 1.12.9, versions before 1.13.6, versions before 1.14.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kubernetes kubernetes

kubernetes kubernetes 1.12.11

Vendor Advisories

Synopsis Important: OpenShift Container Platform 310 atomic-openshift security update Type/Severity Security Advisory: Important Topic An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 310Red Hat Product Security has rated this update as having a security impact of ...
Synopsis Important: OpenShift Container Platform 39 atomic-openshift security update Type/Severity Security Advisory: Important Topic An update for atomic-openshift is now available for Red Hat OpenShiftContainer Platform 39Red Hat Product Security has rated this update as having a security impact of Imp ...
Synopsis Moderate: Red Hat OpenShift Container Platform 311 atomic-openshift security update Type/Severity Security Advisory: Moderate Topic An update for atomic-openshift is now available for OpenShift Container Platform 311Red Hat Product Security has rated this update as having a security impact of Mo ...
Synopsis Moderate: Red Hat OpenShift Container Platform 310 atomic-openshift security update Type/Severity Security Advisory: Moderate Topic An update for atomic-openshift is now available for OpenShift Container PlatformRed Hat Product Security has rated this update as having a security impact of Moderat ...
Synopsis Moderate: OpenShift Container Platform 39 atomic-openshift security update Type/Severity Security Advisory: Moderate Topic An update for atomic-openshift is now available for Red Hat OpenShiftContainer Platform 39Red Hat Product Security has rated this update as having a security impactof Modera ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246 <!--X-Subject-Head ...

Github Repositories

Shortlist of preparation materials to pass CKS exam

CKS Exam Preparation CKS Exam Preparation Intro Usefull courses General security-related docs Cirriclium Topics Cluster Setup – 10% Use Network security policies to restrict cluster level access Use CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi) Properly set up Ingress objects with security control Protect

CKS Sections with a (*) are in progress and only have links and not yet additional content Cluster Setup – 10% Use Network security policies to restrict cluster level access kubectl explain NetworkPolicyspec NetworkPolicy's are applied to a namespace The specpodSelector defines criteria for the namespace Default deny all ing