CVE-2020-8568:
Directory traversal in Kubernetes Secrets Store CSI Driver
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62682%
CWE
Published
2/15/2022
Updated
10/2/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
sigs.k8s.io/secrets-store-csi-driver | go | >= 0.0.15, < 0.0.17 | 0.0.17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from: 1) Insecure path parsing in getPodUIDFromTargetPath()
using a regex that didn't properly validate()
full path structure 2) Missing validation in Reconcile/reconcile
functions that allowed processing arbitrary targetPaths
. The patch added critical validation checks (GetPodUIDFromTargetPath
, GetVolumeNameFromTargetPath
, SPCVolume
) to ensure targetPath
matches pod metadata, which were absent in vulnerable versions.