Impact
The vulnerability arises from insufficient validation of the subDir parameter within Kubernetes CSI Driver for NFS, enabling attackers to craft path traversal sequences such as "../" in volume identifiers. When the driver performs deletions or cleanup operations on those volumes, it resolves the path traversal and operates on directories outside the intended NFS export. This allows unintended deletion or modification of directories on the NFS server, compromising data integrity and availability.
Affected Systems
The affected product is Kubernetes CSI Driver for NFS. Versions prior to v4.13.1 are vulnerable, as the advisory recommends upgrading to 4.13.1 or newer. The driver is used in Kubernetes clusters to provide block storage through NFS exports; any cluster that employs the unpatched driver and permits users or workloads to create arbitrary PersistentVolumes is at risk.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. The vulnerability is not listed in the CISA KEV catalog and no EPSS score is available. Exploitation requires permissions to create PersistentVolumes, typically cluster-admin or equivalent privileges. During a delete or orphan cleanup operation, the driver will resolve the path traversal before executing filesystem commands, enabling an attacker to permanently remove or alter data stored on the NFS server.
OpenCVE Enrichment
Github GHSA