Symlink Attack Affecting github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp package, versions >=1.13.10 <1.13.11 >=1.14.6 <1.14.7 >=1.15.3 <1.16.0


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High

    Threat Intelligence

    EPSS 0.05% (18th percentile)
Expand this section
NVD
5.7 medium
Expand this section
Red Hat
5.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMKUBERNETESKUBERNETESPKGKUBECTLCMDCP-544134
  • published 4 Feb 2020
  • disclosed 3 Feb 2020
  • credit Erik Sjölund

How to fix?

Upgrade github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp to version 1.13.11, 1.14.7, 1.16.0 or higher.

Overview

github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp is a Production-Grade Container Scheduling and Management.

Affected versions of this package are vulnerable to Symlink Attack. It allows a combination of two symlinks to copy a file outside of its destination directory. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.