Kubernetes 1.12.x < 1.12.9 / 1.13.x < 1.13.6 / 1.14.x < 1.14.2 kubectl directory traversal

Medium Nessus Plugin ID 126468


The remote host contains an application affected by a directory traversal vulnerability.


The version of Kubernetes installed on the remote host is a version prior to 1.12.9, or 1.13.x prior to 1.13.6, or 1.14.x prior to 1.14.2. It is, therefore, affected by a directory traversal vulnerability in the kubectl cp command due to mishandling of symlinks when copying files from a running container. An unauthenticated, remote attacker can exploit this, by convincing a user to use kubectl cp with a malicious container to overwrite arbitrary files on the remote host.


Upgrade to Kubernetes 1.12.9, 1.13.6, 1.14.2 or later, please refer to the vendor advisory.

See Also


Plugin Details

Severity: Medium

ID: 126468

File Name: kubernetes_1_14_2_directory_traversal.nasl

Version: 1.4

Type: local

Agent: unix

Family: Misc.

Published: 2019/07/04

Updated: 2019/10/30

Dependencies: 112063

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2019-11246

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:kubernetes:kubernetes, cpe:/a:google:kubernetes

Required KB Items: installed_sw/Kubernetes

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/06/25

Vulnerability Publication Date: 2019/06/25

Reference Information

CVE: CVE-2019-11246

BID: 108866