Impact
Tekton Pipelines’ HTTP resolver reads HTTP response bodies without a size limit, leading to uncontrolled memory consumption when a malicious server delivers a very large payload. The vulnerability resides in the FetchHttpResource function of both the deprecated and current HTTP resolver implementations. When an overlarge body is processed, the tekton‑pipelines‑resolvers pod is OOM‑killed, interrupting all resolver services and causing a cluster‑wide denial of service. The weakness is characterized by CWE‑400.
Affected Systems
All Tekton Pipeline installations using versions prior to 1.11.1 are affected, including every resolver type (Git, Hub, Bundle, Cluster, HTTP). Any tenant who can create TaskRuns or PipelineRuns has the authority to trigger the vulnerability by referencing an HTTP resolver pointed at a malicious endpoint.
Risk and Exploitability
The CVSS score of 6.5 indicates medium severity, and the lack of an EPSS score suggests there is no emerging widespread exploitation data. The vulnerability was not listed in CISA KEV. An attacker must have permissions to create TaskRuns or PipelineRuns; once privileged, they can induce the resolver pod to consume excessive memory and crash repeatedly, resulting in a sustained denial of service. The attack is cluster‑wide due to the shared resolver pod, but does not provide remote code execution or data exfiltration. The risk is primarily availability degradation.
OpenCVE Enrichment
Github GHSA