Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5305

Опубликовано: 27 окт. 2015
Источник: redhat
CVSS2: 4

Описание

Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd.

Kubernetes fails to validate object name types before passing the data to etcd. As the etcd service generates keys based on the object name type this can lead to a directory path traversal.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1273969Kubernetes: Missing name validation allows path traversal in etcd

4 Medium

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd.

debian
больше 10 лет назад

Directory traversal vulnerability in Kubernetes, as used in Red Hat Op ...

CVSS3: 6.5
github
почти 4 года назад

Directory Traversal in Kubernetes

4 Medium

CVSS2