Remote Code Execution (RCE) The advisory has been revoked - it doesn't affect any version of package k8s.io/kubernetes Open this link in a new tab


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-K8SIOKUBERNETES-1534886

  • published

    30 Jul 2021

  • disclosed

    29 Jul 2021

  • credit

    Sean Sullivan

Introduced: 29 Jul 2021

CWE-94 Open this link in a new tab

Amendment

This was deemed not a vulnerability.

Overview

k8s.io/kubernetes is a Production-Grade Container Scheduling and Management.

Affected versions of this package are vulnerable to Remote Code Execution (RCE) through running kubectl book, as one of the Dockerfile commands is curl -sL https://deb.nodesource.com/setup_11.x | bash. A malicious actor with control of the hardcoded URL could host malicious code there, which would be run on victim systems via the above command.

References