A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1923405 | Issue Tracking Vendor Advisory |
https://github.com/fabric8io/kubernetes-client/issues/2715 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1923405 | Issue Tracking Vendor Advisory |
https://github.com/fabric8io/kubernetes-client/issues/2715 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1923405 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/fabric8io/kubernetes-client/issues/2715 - Patch, Third Party Advisory |
Information
Published : 2021-03-16 21:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20218
Mitre link : CVE-2021-20218
CVE.ORG link : CVE-2021-20218
JSON object : View
Products Affected
redhat
- codeready_studio
- jboss_fuse
- process_automation
- kubernetes-client
- a-mq_online
- descision_manager
- build_of_quarkus
- integration_camel_k
- openshift_container_platform
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')