Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
References
Link | Resource |
---|---|
https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/384 | Patch Third Party Advisory |
https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/BI2qisiNXHY | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-01-21 09:15
Updated : 2021-08-27 09:07
NVD link : CVE-2020-8567
Mitre link : CVE-2020-8567
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
microsoft
- azure_key_vault_provider_for_secrets_store_csi_driver
hashicorp
- vault_provider_for_secrets_store_csi_driver
- secret_manager_provider_for_secret_store_csi_driver