First published: Wed Oct 21 2015(Updated: )
Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/kubernetes | <1.1.1 | 1.1.1 |
go/github.com/kubernetes/kubernetes | <1.1.1 | 1.1.1 |
Redhat Openshift | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.