<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Local-Path-Provisioner (&lt; 0.0.34) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/local-path-provisioner--0.0.34/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:18:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/local-path-provisioner--0.0.34/feed.xml" rel="self" type="application/rss+xml"/><item><title>Rancher local-path-provisioner Vulnerable to HelperPod Template Injection (CVE-2026-44543)</title><link>https://feed.craftedsignal.io/briefs/2026-05-local-path-provisioner-template-injection/</link><pubDate>Mon, 11 May 2026 16:18:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-local-path-provisioner-template-injection/</guid><description>A malicious user with permission to edit the `local-path-config` ConfigMap in the `local-path-storage` namespace can manipulate the `helperPod.yaml` template used by `rancher/local-path-provisioner`. Security-sensitive fields such as `securityContext.privileged`, `hostPath` volumes, and Linux capabilities can be injected into the template, leading to a privileged pod running on the target node with the host root filesystem mounted.</description><content:encoded><![CDATA[<p>The Rancher local-path-provisioner is vulnerable to a HelperPod template injection. A malicious user with the ability to modify the <code>local-path-config</code> ConfigMap in the <code>local-path-storage</code> namespace can manipulate the <code>helperPod.yaml</code> template. This template is used by the provisioner to create HelperPods during PersistentVolumeClaim (PVC) provisioning and cleanup. The vulnerability stems from insufficient validation of the <code>helperPod.yaml</code> template, which allows the injection of security-sensitive fields like <code>securityContext.privileged</code>, <code>hostPath</code> volumes, and Linux capabilities. Successfully exploiting this vulnerability can result in a privileged pod running on the target node with the host root filesystem mounted. Patched versions of <code>local-path-provisioner</code> include releases v0.0.34 and later. This issue is identified as CVE-2026-44543.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the Kubernetes cluster.</li>
<li>Attacker obtains permission to edit the <code>local-path-config</code> ConfigMap within the <code>local-path-storage</code> namespace.</li>
<li>Attacker modifies the <code>helperPod.yaml</code> template within the <code>local-path-config</code> ConfigMap to inject malicious configurations, such as setting <code>securityContext.privileged</code> to <code>true</code> or adding a <code>hostPath</code> volume mount.</li>
<li>Attacker triggers a PVC provisioning or cleanup operation, causing the <code>local-path-provisioner</code> to load the modified <code>helperPod.yaml</code> template.</li>
<li>The <code>local-path-provisioner</code> creates a HelperPod based on the attacker-controlled template.</li>
<li>The malicious HelperPod is deployed on a node within the cluster, inheriting the injected privileges, such as privileged access or a host root filesystem mount.</li>
<li>The attacker leverages the privileged HelperPod to access sensitive host files, read ServiceAccount tokens, or modify files on the host node.</li>
<li>The attacker escalates privileges and potentially compromises the entire node or cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized access to sensitive host files, including ServiceAccount tokens from other pods residing on the same node. Attackers can also access other tenants&rsquo; local-path volume data, potentially leading to data breaches and further lateral movement within the cluster. Modification of files on the host node can disrupt services and compromise the integrity of the system. The vulnerability, CVE-2026-44543, presents a significant risk to Kubernetes environments utilizing the Rancher local-path-provisioner.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>local-path-provisioner</code> version v0.0.34 or later to incorporate the fix that validates the HelperPod template, mitigating the risk of injecting malicious configurations (reference: Patches section).</li>
<li>Restrict write access to the <code>local-path-config</code> ConfigMap in the <code>local-path-storage</code> namespace, ensuring that only trusted administrators can modify this ConfigMap (reference: Workarounds section).</li>
<li>Mark the ConfigMap as immutable after deployment to prevent unauthorized modifications (reference: Workarounds section and example <code>kubectl</code> command).</li>
<li>Enable Kubernetes Pod Security Admission (PSA) for the <code>local-path-storage</code> namespace, enforcing a security policy like <code>baseline</code> to prevent privileged HelperPods from being created, even if the template is altered (reference: Workarounds section and example <code>kubectl</code> command).</li>
<li>Monitor Kubernetes audit logs for modifications to the <code>local-path-config</code> ConfigMap in the <code>local-path-storage</code> namespace, alerting on unexpected changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>privilege-escalation</category><category>template-injection</category></item></channel></rss>