Symlink Attack Affecting k8s.io/kubernetes/pkg/kubelet/rkt Open this link in a new tab package, versions >=1.3.0 <1.7.14 >=1.8.0 <1.8.9 >=1.9.0 <1.9.4


0.0
critical
  • Exploit Maturity

    Proof of concept

  • Attack Complexity

    Low

  • Scope

    Changed

  • Confidentiality

    High

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-K8SIOKUBERNETESPKGKUBELETRKT-2825259

  • published

    17 May 2022

  • disclosed

    17 May 2022

  • credit

    Maxim Ivanov

How to fix?

Upgrade k8s.io/kubernetes/pkg/kubelet/rkt to version 1.7.14, 1.8.9, 1.9.4 or higher.

Overview

Affected versions of this package are vulnerable to Symlink Attack due to not enforcing limitations on symlink creation in mounts, allowing said symlinks to point to resources outside the volumes specified in the pod using relative path syntax.