CVE-2021-20218
Published Mar 16, 2021
Last updated 4 years ago
Overview
- Description
- A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 5.2
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:P
Weaknesses
- secalert@redhat.com
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "396A03F1-9514-4805-9AB5-6B31FD4B4413", "versionEndExcluding": "4.7.2", "versionStartIncluding": "4.2.0" }, { "criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15E80E40-DCBB-4043-B074-674D548FD0AA", "versionEndExcluding": "4.11.2", "versionStartIncluding": "4.8.0" }, { "criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A777CC85-DC45-4E4B-B11C-E0CF9F06593D", "versionEndExcluding": "4.13.2", "versionStartIncluding": "4.12.0" }, { "criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70D40776-9CBC-4F2F-9702-525330082531", "versionEndExcluding": "5.0.2", "versionStartIncluding": "5.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:a-mq_online:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6C99D72-43AD-4A22-AE66-44E868323D4C" }, { "criteria": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37" }, { "criteria": "cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BAF877F-B8D5-4313-AC5C-26BB82006B30" }, { "criteria": "cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5863BBF-829E-44EF-ACE8-61D5037251F6" }, { "criteria": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B87C8AD3-8878-4546-86C2-BF411876648C" }, { "criteria": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B40CCE4F-EA2C-453D-BB76-6388767E5C6D" }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B" }, { "criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7" } ], "operator": "OR" } ] } ]