Kubernetes 1.12.x < 1.12.9 / 1.13.x < 1.13.6 / 1.14.x < 1.14.2 kubectl directory traversal

medium Nessus Plugin ID 126468

Synopsis

The remote host contains an application affected by a directory traversal vulnerability.

Description

The version of Kubernetes installed on the remote host is a version prior to 1.12.9, or 1.13.x prior to 1.13.6, or 1.14.x prior to 1.14.2. It is, therefore, affected by a directory traversal vulnerability in the kubectl cp command due to mishandling of symlinks when copying files from a running container. An unauthenticated, remote attacker can exploit this, by convincing a user to use kubectl cp with a malicious container to overwrite arbitrary files on the remote host.

Solution

Upgrade to Kubernetes 1.12.9, 1.13.6, 1.14.2 or later, please refer to the vendor advisory.

See Also

http://www.nessus.org/u?77d7634b

Plugin Details

Severity: Medium

ID: 126468

File Name: kubernetes_1_14_2_directory_traversal.nasl

Version: 1.6

Type: local

Agent: unix

Family: Misc.

Published: 7/4/2019

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2019-11246

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:kubernetes:kubernetes, cpe:/a:google:kubernetes

Required KB Items: installed_sw/Kubernetes

Exploit Ease: No known exploits are available

Patch Publication Date: 6/25/2019

Vulnerability Publication Date: 6/25/2019

Reference Information

CVE: CVE-2019-11246

BID: 108866