CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.
Publish Date : 2019-04-01 Last Update Date : 2020-02-10
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
5.8
Confidentiality Impact None (There is no impact to the confidentiality of the system.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 59

- Products Affected By CVE-2019-1002101

# Product Type Vendor Product Version Update Edition Language
1 Application Kubernetes Kubernetes * * * * Version Details Vulnerabilities
2 Application Kubernetes Kubernetes 1.14.0 * * * Version Details Vulnerabilities
3 Application Redhat Openshift Container Platform 3.9 * * * Version Details Vulnerabilities
4 Application Redhat Openshift Container Platform 3.10 * * * Version Details Vulnerabilities
5 Application Redhat Openshift Container Platform 3.11 * * * Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Kubernetes Kubernetes 2
Redhat Openshift Container Platform 3

- References For CVE-2019-1002101

https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/
http://www.openwall.com/lists/oss-security/2019/08/05/5
MLIST [oss-security] 20190805 Kubernetes v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249
http://www.openwall.com/lists/oss-security/2019/06/21/1
MLIST [oss-security] 20190620 [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246
https://access.redhat.com/security/cve/cve-2019-1002101
CVE-2019-1002101
https://lists.fedoraproject.org/archives/list/[email protected]/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/
FEDORA FEDORA-2019-bf800b1c04
https://access.redhat.com/errata/RHBA-2019:0619
REDHAT RHBA-2019:0619
https://github.com/kubernetes/kubernetes/pull/75037
https://access.redhat.com/errata/RHBA-2019:0620
REDHAT RHBA-2019:0620
http://www.securityfocus.com/bid/107652
BID 107652 Kubernetes CVE-2019-1002101 Arbitrary File Overwrite Vulnerability Release Date:2019-03-28
https://lists.fedoraproject.org/archives/list/[email protected]/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/
FEDORA FEDORA-2019-2b8ef08c95
https://access.redhat.com/errata/RHBA-2019:0636
REDHAT RHBA-2019:0636

- Metasploit Modules Related To CVE-2019-1002101

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.