First published: Tue Jan 12 2021(Updated: )
A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.7.1616671397-1.el8 | 2-plugins-0:4.7.1616671397-1.el8 |
Redhat Kubernetes-client | >=4.2.0<4.7.2 | |
Redhat Kubernetes-client | >=4.8.0<4.11.2 | |
Redhat Kubernetes-client | >=4.12.0<4.13.2 | |
Redhat Kubernetes-client | >=5.0.0<5.0.2 | |
Redhat A-mq Online | ||
Redhat Build Of Quarkus | ||
Redhat Codeready Studio | =12.0 | |
Redhat Descision Manager | =7.0 | |
Redhat Integration Camel K | ||
Redhat Jboss Fuse | =7.0.0 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Process Automation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-20218 is a vulnerability in the fabric8 kubernetes-client that allows a malicious pod/container to extract files outside the working path.
The highest threat from CVE-2021-20218 is to integrity.
A malicious pod/container can exploit CVE-2021-20218 by using the fabric8 kubernetes-client 'copy' command to extract files outside the working path.
Versions 4.2.0 and after of the fabric8 kubernetes-client are affected by CVE-2021-20218.
You can find more information about CVE-2021-20218 on the GitHub issue page and the Red Hat security advisory.