First published: Thu Jan 21 2021(Updated: )
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp | <0.2.0 | 0.2.0 |
go/github.com/Azure/secrets-store-csi-driver-provider-azure | <0.0.10 | 0.0.10 |
go/github.com/hashicorp/vault-csi-provider | <0.0.6 | 0.0.6 |
Google Secret Manager Provider for Secret Store CSI Driver | <0.2.0 | |
HashiCorp Vault | <0.0.6 | |
Microsoft Azure Key Vault Provider For Secrets Store Csi Driver | <0.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8567 is classified as a high-severity vulnerability due to its potential for remote file system access.
To remediate CVE-2020-8567, upgrade to versions 0.0.6, 0.0.10, or 0.2.0 of the affected Kubernetes Secrets Store CSI Driver plugins.
CVE-2020-8567 affects the Hashicorp Vault Provider for Secrets Store CSI Driver prior to version 0.0.6, Azure Key Vault Provider prior to version 0.0.10, and GCP provider prior to version 0.2.0.
An attacker exploiting CVE-2020-8567 can create malicious SecretProviderClass objects, allowing them to write to arbitrary file paths on the host filesystem.
Software vulnerable to CVE-2020-8567 includes Hashicorp Vault Provider, Microsoft Azure Key Vault Provider, and Google Secret Manager Provider for Secrets Store CSI Driver.