Modifying pod status allows host directory traversal.
Kubernetes Secrets Store CSI Driver allows an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.
{ "review_status": "REVIEWED", "url": "https://pkg.go.dev/vuln/GO-2022-0629" }
{ "imports": [ { "path": "sigs.k8s.io/secrets-store-csi-driver/controllers", "symbols": [ "SecretProviderClassPodStatusReconciler.Reconcile" ] }, { "path": "sigs.k8s.io/secrets-store-csi-driver/pkg/rotation", "symbols": [ "Reconciler.Run", "Reconciler.reconcile" ] }, { "path": "sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-store", "symbols": [ "SecretsStore.Run", "nodeServer.NodeUnpublishVolume" ] } ] }