CVE-2019-11251
low-risk
Published 2020-02-03
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
Do I need to act?
~
3.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.8/10
Medium
NETWORK
/ HIGH complexity
Affected Products (2)
Affected Vendors
References (4)
Third Party Advisory
https://github.com/kubernetes/kubernetes/issues/87773
Third Party Advisory
https://github.com/kubernetes/kubernetes/issues/87773
29
/ 100
low-risk
Severity
15/34 · Moderate
Exploitability
7/34 · Low
Exposure
7/34 · Low