Impact
The Tekton Pipelines project, from version 1.0.0 to before 1.11.0, passes the git resolver's revision parameter directly to the git fetch command without validating that it does not begin with a minus sign. An attacker who can submit a ResolutionRequest can therefore inject arbitrary git flags, such as --upload-pack, into the fetch call. Coupled with the validateRepoURL function that permits URLs starting with a slash, this permits chaining the injection of a binary name that will be executed on the resolver pod. Because the resolver runs under the tekton-pipelines-resolvers ServiceAccount, which has cluster-wide get/list/watch permissions on all Secrets, even a single successful exploit leads to full cluster-wide secret exfiltration. This flaw is a Remote Code Execution vulnerability and is identified as CWE-88.
Affected Systems
Tekton Pipelines deployments using the tektoncd:pipeline project, specifically versions 1.0.0 through 1.11.0, are affected. Upgrading to 1.11.1 or later resolves the issue; systems running any earlier release remain vulnerable until a patch is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity risk of arbitrary code execution. No EPSS score is presently available, so the exact exploitation probability cannot be quantified. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the capability to create or modify a ResolutionRequest, which can be achievable in multi-tenant or permissively configured namespaces. Successful exploitation results in the attacker gaining broad cluster access to Secrets via the resolver pod.
OpenCVE Enrichment
Github GHSA