Improper Input Validation Affecting k8s.io/kubernetes/pkg/kubectl/cmd package, versions <1.26.0-alpha.3


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-K8SIOKUBERNETESPKGKUBECTLCMD-2331662
  • published 7 Jan 2022
  • disclosed 7 Jan 2022
  • credit Eviatar Gerzi

How to fix?

Upgrade k8s.io/kubernetes/pkg/kubectl/cmd to version 1.26.0-alpha.3 or higher.

Overview

k8s.io/kubernetes/pkg/kubectl/cmd is a package that provides the functions used by the kubectl command line tool under k8s.io/kubernetes/cmd. The functions are kept in this package to better support unit testing. The main() method for kubectl is only an entry point and should contain no functionality.

Affected versions of this package are vulnerable to Improper Input Validation. Kubectl does not neutralize escape, meta, or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Event objects.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
3 low
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Required
  • Scope (S)
    Changed
  • Confidentiality (C)
    None
  • Integrity (I)
    Low
  • Availability (A)
    None
Expand this section

NVD

3 low
Expand this section

SUSE

4 medium
Expand this section

Red Hat

3 low