Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-11249

Summary
Assigner-kubernetes
Assigner Org ID-a6081bf6-c852-4425-ad4f-a67919267565
Published At-29 Aug, 2019 | 00:26
Updated At-16 Sep, 2024 | 18:19
Rejected At-
Credits

kubectl cp allows symlink directory traversal

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:kubernetes
Assigner Org ID:a6081bf6-c852-4425-ad4f-a67919267565
Published At:29 Aug, 2019 | 00:26
Updated At:16 Sep, 2024 | 18:19
Rejected At:
▼CVE Numbering Authority (CNA)
kubectl cp allows symlink directory traversal

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

Affected Products
Vendor
KubernetesKubernetes
Product
Kubernetes
Versions
Affected
  • prior to 1.13.9
  • prior to 1.14.5
  • prior to 1.15.2
  • 1.1
  • 1.2
  • 1.4
  • 1.5
  • 1.6
  • 1.7
  • 1.8
  • 1.9
  • 1.10
  • 1.11
  • 1.12
Problem Types
TypeCWE IDDescription
CWECWE-61CWE-61: UNIX Symbolic Link (Symlink) Following
Type: CWE
CWE ID: CWE-61
Description: CWE-61: UNIX Symbolic Link (Symlink) Following
Metrics
VersionBase scoreBase severityVector
3.04.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Version: 3.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Yang Yang, Amazon
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ
mailing-list
x_refsource_MLIST
https://github.com/kubernetes/kubernetes/issues/80984
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20190919-0003/
x_refsource_CONFIRM
https://access.redhat.com/errata/RHBA-2019:2816
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHBA-2019:2794
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHBA-2019:2824
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3239
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3811
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://github.com/kubernetes/kubernetes/issues/80984
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20190919-0003/
Resource:
x_refsource_CONFIRM
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2816
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2794
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2824
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3239
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3811
Resource:
vendor-advisory
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ
mailing-list
x_refsource_MLIST
x_transferred
https://github.com/kubernetes/kubernetes/issues/80984
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20190919-0003/
x_refsource_CONFIRM
x_transferred
https://access.redhat.com/errata/RHBA-2019:2816
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHBA-2019:2794
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHBA-2019:2824
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:3239
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:3811
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://github.com/kubernetes/kubernetes/issues/80984
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20190919-0003/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2816
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2794
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2824
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3239
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3811
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:jordan@liggitt.net
Published At:29 Aug, 2019 | 01:15
Updated At:02 Oct, 2020 | 16:45

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Secondary3.04.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P
CPE Matches

Kubernetes
kubernetes
>>kubernetes>>Versions from 1.0.0(inclusive) to 1.12.10(inclusive)
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Kubernetes
kubernetes
>>kubernetes>>Versions from 1.13.0(inclusive) to 1.13.9(exclusive)
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Kubernetes
kubernetes
>>kubernetes>>Versions from 1.14.0(inclusive) to 1.14.5(exclusive)
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Kubernetes
kubernetes
>>kubernetes>>Versions from 1.15.0(inclusive) to 1.15.2(exclusive)
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Kubernetes
kubernetes
>>kubernetes>>1.12.11
cpe:2.3:a:kubernetes:kubernetes:1.12.11:beta0:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>3.9
cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>3.10
cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>3.11
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.1
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE-61Secondaryjordan@liggitt.net
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-61
Type: Secondary
Source: jordan@liggitt.net
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHBA-2019:2794jordan@liggitt.net
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:2816jordan@liggitt.net
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:2824jordan@liggitt.net
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3239jordan@liggitt.net
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3811jordan@liggitt.net
Third Party Advisory
https://github.com/kubernetes/kubernetes/issues/80984jordan@liggitt.net
Patch
Third Party Advisory
https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJjordan@liggitt.net
Patch
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190919-0003/jordan@liggitt.net
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2794
Source: jordan@liggitt.net
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2816
Source: jordan@liggitt.net
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHBA-2019:2824
Source: jordan@liggitt.net
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3239
Source: jordan@liggitt.net
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3811
Source: jordan@liggitt.net
Resource:
Third Party Advisory
Hyperlink: https://github.com/kubernetes/kubernetes/issues/80984
Source: jordan@liggitt.net
Resource:
Patch
Third Party Advisory
Hyperlink: https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ
Source: jordan@liggitt.net
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20190919-0003/
Source: jordan@liggitt.net
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found