-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potential CVE? #2715
Comments
I finally managed to create a reproducer for this CVE. I first created a Container Image which contains a poisoned tar binary. The following gist contains a JBang script that will exploit the vulnerability.
This is an excerpt of the script: final Path targetDirectory = Paths.get("", "target-directory");
targetDirectory.toFile().mkdirs();
kc.pods().withName(podName).dir("/var/lib").copy(targetDirectory); According to this script, the contents of the container's However, when the script is executed, a file If you were to extract this intermediate tar using the standard tar command, you would be greeted with the following error:
You would need to force the extraction using the |
- Fix for CVE-2021-20218 fabric8io/kubernetes-client#2715 (cherry picked from commit d43a3e1)
A recently found vulnerability was fixed in another project similar to this one. It might potentially affect a similar implementation in
PodOperationsImpl
.Ironically, it prints out the normalized path into stdout, but uses the original (potentially dangerous) path.
The text was updated successfully, but these errors were encountered: