CVE-2021-20218

A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2
References
Link Resource
https://github.com/fabric8io/kubernetes-client/issues/2715 Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1923405 Issue Tracking Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:a-mq_online:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*

Information

Published : 2021-03-16 14:15

Updated : 2021-03-25 11:43


NVD link : CVE-2021-20218

Mitre link : CVE-2021-20218


JSON object : View

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Advertisement

dedicated server usa

Products Affected

redhat

  • kubernetes-client
  • build_of_quarkus
  • descision_manager
  • jboss_fuse
  • process_automation
  • openshift_container_platform
  • integration_camel_k
  • codeready_studio
  • a-mq_online