Impact
Exploit of the Tekton Pipelines git resolver permits an attacker with permission to create ResolutionRequests to perform path traversal through the pathInRepo parameter. This allows reading arbitrary files from the resolver pod’s filesystem, including sensitive ServiceAccount tokens. The vulnerability is classified as CWE‑22 and can lead to the compromise of credentials and other confidential data.
Affected Systems
The affected product is Tekton CD Pipelines, a Kubernetes-native continuous integration and delivery system. The issue impacts all releases from version 1.0.0 up until the patched releases 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. Any installation that has not upgraded to one of these patched releases remains vulnerable.
Risk and Exploitability
The CVSS score of 9.6 marks it as critical, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the general population, though it is not listed in the CISA KEV catalog. The attack requires only the ability to submit a ResolutionRequest, a privilege that many cluster users possess. Once such access is available, an attacker can read any file on the resolver pod, including identity tokens that enable further lateral movement, making the threat significant in environments where users can create tasks that call the git resolver.
OpenCVE Enrichment
Github GHSA