{"id":"GO-2022-0701","summary":"Directory traversal in k8s.io/kubernetes","details":"Crafted object type names can cause directory traversal in Kubernetes.\n\nObject names are not validated before being passed to etcd. This allows attackers to write arbitrary files via a crafted object name, hence causing directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0.","aliases":["CVE-2015-5305","GHSA-jp32-vmm6-3vf5"],"modified":"2024-07-19T16:04:58Z","published":"2022-02-15T01:57:18Z","database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2022-0701"},"references":[{"type":"FIX","url":"https://github.com/kubernetes/kubernetes/pull/16381"},{"type":"FIX","url":"https://github.com/kubernetes/kubernetes/commit/37f730f68c7f06e060f90714439bfb0dbb2df5e7"}],"affected":[{"package":{"name":"k8s.io/kubernetes","ecosystem":"Go","purl":"pkg:golang/k8s.io/kubernetes"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.1.1"}]}],"ecosystem_specific":{"imports":[{"path":"k8s.io/kubernetes/pkg/api/rest","symbols":["BeforeCreate"]},{"path":"k8s.io/kubernetes/pkg/registry/generic/etcd","symbols":["NamespaceKeyFunc"]},{"path":"k8s.io/kubernetes/pkg/api/storage","symbols":["NamespaceKeyFunc","NoNamespaceKeyFunc"]},{"path":"k8s.io/kubernetes/pkg/registry/namespace/etcd","symbols":["NewREST"]},{"path":"k8s.io/kubernetes/pkg/registry/node/etcd","symbols":["NewREST"]},{"path":"k8s.io/kubernetes/pkg/registry/persistentvolume/etcd","symbols":["NewREST"]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-0701.json"}}],"schema_version":"1.7.3","credits":[{"name":"liggitt (Jordan Liggitt)"}]}