CVE-2019-11251
Red Hat Enterprise Linux CoreOS (RHCOS) vulnerability analysis and mitigation

Overview

CVE-2019-11251 is a security vulnerability discovered in the Kubernetes kubectl cp command affecting versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4. The vulnerability allows attackers to exploit a combination of two symlinks provided by tar output of a malicious container to place files outside of the destination directory specified in the kubectl cp invocation (NVD, Kubernetes Announce).

Technical details

The vulnerability is similar to previous issues CVE-2019-1002101 and CVE-2019-11246, involving the kubectl cp command's handling of symlinks. The vulnerability has a CVSS v3.1 base score of 5.7 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N. The issue stems from improper handling of symlink resolution during file copying operations, which could allow an attacker to manipulate file placement outside the intended destination tree (NVD).

Impact

If exploited, this vulnerability allows attackers to place malicious files outside of the intended destination directory through symlink manipulation. This could potentially lead to unauthorized file placement anywhere in the system where the kubectl command has write permissions (Kubernetes Issue).

Mitigation and workarounds

Two fixes were implemented to address this vulnerability. For version 1.16.0, symlink support was completely removed from kubectl cp, with users recommended to use a combination of exec+tar instead. For versions 1.15.4, 1.14.7, and 1.13.11, the kubectl cp un-tar symlink logic was modified to unpack symlinks after regular files, preventing file writes through symlinks. Users are encouraged to upgrade to these patched versions (Kubernetes Issue).

Additional resources


SourceThis report was generated using AI

Related Red Hat Enterprise Linux CoreOS (RHCOS) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-11561HIGH8.8
  • Rocky LinuxRocky Linux
  • python3-sssd-config
NoYesOct 09, 2025
CVE-2025-52565HIGH8.4
  • cAdvisorcAdvisor
  • kernel-rt-modules-internal
NoYesNov 06, 2025
CVE-2025-4953HIGH7.4
  • PodmanPodman
  • kernel-rt-debug-kvm
NoYesSep 16, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • kernel-debug-modules-internal
NoYesNov 06, 2025
CVE-2025-31133HIGH7.3
  • cAdvisorcAdvisor
  • container-tools:rhel8::fuse-overlayfs
NoYesNov 06, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management