Modifying pod status allows host directory traversal.
Kubernetes Secrets Store CSI Driver allows an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.
{
"url": "https://pkg.go.dev/vuln/GO-2022-0629",
"review_status": "REVIEWED"
}{
"imports": [
{
"symbols": [
"SecretProviderClassPodStatusReconciler.Reconcile"
],
"path": "sigs.k8s.io/secrets-store-csi-driver/controllers"
},
{
"symbols": [
"Reconciler.Run",
"Reconciler.reconcile"
],
"path": "sigs.k8s.io/secrets-store-csi-driver/pkg/rotation"
},
{
"symbols": [
"SecretsStore.Run",
"nodeServer.NodeUnpublishVolume"
],
"path": "sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-store"
}
]
}