First published: Fri Jan 07 2022(Updated: )
kubectl (k8s.io/kubernetes/pkg/kubectl) does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/kubernetes | <1.26.0-alpha.3 | 1.26.0-alpha.3 |
Kubernetes Dashboard | <=1.18.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25743 is a vulnerability in kubectl, where it does not neutralize escape, meta, or control sequences contained in the raw data it outputs to a terminal.
CVE-2021-25743 has a severity level of low.
Versions up to and including 1.26.0-alpha.3 of k8s.io/kubernetes and versions up to and including 1.18.0 of Kubernetes are affected by CVE-2021-25743.
To fix CVE-2021-25743, update to version 1.26.0-alpha.3 of k8s.io/kubernetes or a later version, or update to a version of Kubernetes above 1.18.0.
You can find more information about CVE-2021-25743 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-25743), [GitHub](https://github.com/kubernetes/kubernetes/issues/101695), [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20220217-0003/).