Skip to content

Potential command line injection from secret #2166

@manusa

Description

@manusa

Description

Mirror of TOB-JKUBE-2.

As part of the Spring Boot watcher functionality, JKube executes a second Java process. The
command line for this process is crafted in an unsafe way, by interpolating an arbitrary
secret in the command line. This command line is then tokenized by separating on spaces.
If the secret contains spaces, this can allow an attacker to add arbitrary arguments and
command line flags and modify the behavior of this command execution.

https://github.com/eclipse/jkube/blob/12edf4a2f947ad1e0b2b44d8317a6052097f93af/jkube-kit/jkube-kit-spring-boot/src/main/java/org/eclipse/jkube/springboot/watcher/SpringBootWatcher.java#L163-L166

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions