Kubernetes 1.11.x < 1.11.9 / 1.12.x < 1.12.7 / 1.13.x < 1.13.5 kubectl directory traversal

medium Nessus Plugin ID 128650

Synopsis

The remote host contains an application affected by a directory traversal vulnerability.

Description

The version of Kubernetes installed on the remote host is version 1.11.x prior to 1.11.9, 1.12.x prior to 1.12.7 or 1.13.x prior to 1.13.5. It is, therefore, affected by a directory traversal vulnerability in the kubectl cp command due to mishandling of symlinks when copying files from a running container. An unauthenticated, remote attacker can exploit this, by convincing a user to use kubectl cp with a malicious container to overwrite arbitrary files on the remote host.

Solution

Upgrade to Kubernetes 1.11.9, 1.12.7, 1.13.5, 1.14.0 or later, please refer to the vendor advisory.

See Also

http://www.nessus.org/u?8f1157ea

Plugin Details

Severity: Medium

ID: 128650

File Name: kubernetes_1_13_5_directory_traversal.nasl

Version: 1.7

Type: local

Agent: unix

Family: Misc.

Published: 9/11/2019

Updated: 4/26/2024

Configuration: Enable thorough checks

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS Score Source: CVE-2019-1002101

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:kubernetes:kubernetes, cpe:/a:google:kubernetes

Required KB Items: installed_sw/Kubernetes

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/6/2019

Vulnerability Publication Date: 3/6/2019

Reference Information

CVE: CVE-2019-1002101

BID: 107652