cve/2017/CVE-2017-1002101.md

39 lines
1.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-1002101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1002101)
![](https://img.shields.io/static/v1?label=Product&message=Kubernetes&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.3.x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=handled%20symbolic%20links%20insecurely&color=brighgreen)
### Description
In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/43622283/awesome-cloud-native-security
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/Metarget/cloud-native-security-book
- https://github.com/Metarget/metarget
- https://github.com/Pray3r/cloud-native-security
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/bgeesaman/subpath-exploit
- https://github.com/brant-ruan/awesome-container-escape
- https://github.com/defgsus/good-github
- https://github.com/h34dless/kubernetes-pocs
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
- https://github.com/iridium-soda/container-escape-exploits
- https://github.com/lnick2023/nicenice
- https://github.com/noirfate/k8s_debug
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/reni2study/Cloud-Native-Security2
- https://github.com/ssst0n3/docker_archive
- https://github.com/trinitonesounds/k8s-subpath-exploit
- https://github.com/xbl3/awesome-cve-poc_qazbnm456