### [CVE-2017-1002101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1002101) ![](https://img.shields.io/static/v1?label=Product&message=Kubernetes&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.3.x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=handled%20symbolic%20links%20insecurely&color=brighgreen) ### Description In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem. ### POC #### Reference No PoCs from references. #### Github - https://github.com/43622283/awesome-cloud-native-security - https://github.com/ARPSyndicate/cvemon - https://github.com/Metarget/awesome-cloud-native-security - https://github.com/Metarget/cloud-native-security-book - https://github.com/Metarget/metarget - https://github.com/Pray3r/cloud-native-security - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground - https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground - https://github.com/atesemre/awesome-cloud-native-security - https://github.com/bgeesaman/subpath-exploit - https://github.com/brant-ruan/awesome-container-escape - https://github.com/defgsus/good-github - https://github.com/h34dless/kubernetes-pocs - https://github.com/hacking-kubernetes/hacking-kubernetes.info - https://github.com/iridium-soda/container-escape-exploits - https://github.com/lnick2023/nicenice - https://github.com/noirfate/k8s_debug - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/reni2study/Cloud-Native-Security2 - https://github.com/ssst0n3/docker_archive - https://github.com/trinitonesounds/k8s-subpath-exploit - https://github.com/xbl3/awesome-cve-poc_qazbnm456