Modifying pod status allows host directory traversal.
Kubernetes Secrets Store CSI Driver allows an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.
{
"review_status": "REVIEWED",
"url": "https://pkg.go.dev/vuln/GO-2022-0629"
}{
"imports": [
{
"path": "sigs.k8s.io/secrets-store-csi-driver/controllers",
"symbols": [
"SecretProviderClassPodStatusReconciler.Reconcile"
]
},
{
"path": "sigs.k8s.io/secrets-store-csi-driver/pkg/rotation",
"symbols": [
"Reconciler.Run",
"Reconciler.reconcile"
]
},
{
"path": "sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-store",
"symbols": [
"SecretsStore.Run",
"nodeServer.NodeUnpublishVolume"
]
}
]
}