Bug 1564305 (CVE-2018-1002100) - CVE-2018-1002100 kubernetes: Kubectl copy doesn't check for paths outside of it's destination directory
Summary: CVE-2018-1002100 kubernetes: Kubectl copy doesn't check for paths outside of ...
Status: NEW
Alias: CVE-2018-1002100
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20180317,repor...
Keywords: Security
Depends On: 1564307 1564337 1567207 1567208 1577292 1577293
Blocks: 1569667
TreeView+ depends on / blocked
Reported: 2018-04-06 00:09 UTC by Jason Shepherd
Modified: 2019-05-20 05:40 UTC (History)
21 users (show)

An improper validation flaw exists in the kubernetes 'kubectl cp' command. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Jason Shepherd 2018-04-06 00:09:51 UTC
When using kubectl to cp files to a pod, if the container returns a malformed tarfile with paths like, '/some/remote/dir/../../../../tmp/foo' kubectl writes this to /tmp/foo instead of /some/local/dir/tmp/foo.


Comment 1 Jason Shepherd 2018-04-06 00:10:05 UTC

Name: Michael Hanselmann (hansmi.ch)

Comment 2 Jason Shepherd 2018-04-06 00:10:44 UTC
Created kubernetes tracking bugs for this issue:

Affects: fedora-all [bug 1564307]

Comment 6 Cedric Buissart 🐶 2018-04-12 07:54:02 UTC

Kubernetes support is moving from Red Hat Enterprise Linux to OpenShift Container Platform.  Kubernetes and its dependencies will no longer be updated through the Extras channel. Instead, the Red Hat customers are advised to use Red Hat's supported Kubernetes-based products such as Red Hat OpenShift Container Platform.

Note You need to log in before you can comment on or make changes to this bug.