CVE-2025-1767

6.5 MEDIUM

📋 TL;DR

This CVE affects Kubernetes clusters using the deprecated in-tree gitRepo volume feature to clone git repositories from other pods on the same node. The vulnerability could allow unauthorized access or manipulation of git repository data. Only clusters still using this deprecated feature are affected.

💻 Affected Systems

Products:
  • Kubernetes
Versions: All versions using in-tree gitRepo volume feature
Operating Systems: All Kubernetes-supported OS
Default Config Vulnerable: ✅ No
Notes: Only affects clusters using the deprecated in-tree gitRepo volume feature. The feature has been deprecated upstream and will not receive security updates.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain unauthorized access to sensitive git repository data, potentially exposing credentials, source code, or configuration secrets stored in repositories.

🟠

Likely Case

Unauthorized reading or modification of git repository contents between pods sharing the same node, potentially leading to data leakage or repository corruption.

🟢

If Mitigated

Limited impact with proper pod isolation and network policies preventing inter-pod communication.

🌐 Internet-Facing: LOW - Requires access to the Kubernetes cluster and specific configuration.
🏢 Internal Only: MEDIUM - Affects internal clusters using the deprecated gitRepo feature.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to the Kubernetes cluster and knowledge of pods using gitRepo volumes on the same node.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A - Feature deprecated, no patch available

Vendor Advisory: https://groups.google.com/g/kubernetes-security-announce/c/19irihsKg7s

Restart Required: No

Instructions:

Migrate from in-tree gitRepo volumes to CSI drivers or other alternatives. The feature is deprecated and will not be patched.

🔧 Temporary Workarounds

Migrate to CSI git volume driver

all

Replace in-tree gitRepo volumes with CSI-compatible git volume drivers

# Update pod specifications to use CSI git driver instead of gitRepo
# Example: Replace 'gitRepo' with appropriate CSI driver configuration

Disable gitRepo volume usage

all

Remove or replace all gitRepo volume configurations in cluster

kubectl get pods --all-namespaces -o yaml | grep -i gitrepo
# Review and update affected pod configurations

🧯 If You Can't Patch

  • Implement strict network policies to isolate pods using gitRepo volumes
  • Apply pod security standards to restrict pod-to-pod communication on affected nodes

🔍 How to Verify

Check if Vulnerable:

Check for pods using gitRepo volumes: kubectl get pods --all-namespaces -o yaml | grep -i 'gitRepo'

Check Version:

kubectl version

Verify Fix Applied:

Confirm no pods are using gitRepo volumes: kubectl get pods --all-namespaces -o yaml | grep -i 'gitRepo' should return no results

📡 Detection & Monitoring

Log Indicators:

  • Unusual git operations between pods
  • Failed git clone attempts from unexpected sources

Network Indicators:

  • Unexpected git protocol traffic between pods on same node

SIEM Query:

kubernetes.pod.volume.type:gitRepo OR kubernetes.event.reason:GitVolumeAccess

🔗 References

📤 Share & Export