<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33211 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33211/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 00:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33211/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tekton Pipelines Git Resolver Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</link><pubDate>Tue, 24 Mar 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</guid><description>The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.</description><content:encoded><![CDATA[<p>The Tekton Pipelines project provides Kubernetes-style resources for declaring CI/CD pipelines. A path traversal vulnerability exists in the git resolver component, tracked as CVE-2026-33211. This vulnerability affects Tekton Pipelines versions 1.0.0 and prior to 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. An attacker with the ability to create <code>ResolutionRequests</code> (e.g., through <code>TaskRuns</code> or <code>PipelineRuns</code> that utilize the git resolver) can exploit this flaw to read any file from the resolver pod&rsquo;s file system. A successful exploit allows attackers to retrieve sensitive information, such as ServiceAccount tokens, which are base64-encoded and returned in <code>resolutionrequest.status.data</code>. The vulnerability has been patched in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. This poses a significant risk in multi-tenant environments where lateral movement and privilege escalation are possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create <code>TaskRuns</code> or <code>PipelineRuns</code> within a Tekton Pipelines environment.</li>
<li>The attacker crafts a malicious <code>ResolutionRequest</code> that leverages the git resolver.</li>
<li>Within the <code>ResolutionRequest</code>, the attacker injects a path traversal sequence into the <code>pathInRepo</code> parameter, such as &ldquo;../../../../etc/passwd&rdquo;.</li>
<li>The git resolver attempts to resolve the resource using the provided path.</li>
<li>Due to the path traversal vulnerability, the resolver accesses the file specified by the attacker on the resolver pod&rsquo;s file system.</li>
<li>The contents of the accessed file are read by the resolver.</li>
<li>The resolver encodes the file content in base64.</li>
<li>The base64-encoded content is returned in the <code>resolutionrequest.status.data</code> field, allowing the attacker to retrieve the content. This can include sensitive files such as ServiceAccount tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33211 allows attackers to read arbitrary files from the Tekton Pipelines resolver pod. This can lead to the compromise of sensitive information, including ServiceAccount tokens. If ServiceAccount tokens are compromised, attackers can potentially gain unauthorized access to Kubernetes resources, leading to privilege escalation, lateral movement within the cluster, and potential data exfiltration. The impact is especially high in multi-tenant environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2 or later to patch CVE-2026-33211.</li>
<li>Implement strict RBAC policies to limit the ability to create <code>TaskRuns</code> and <code>PipelineRuns</code> to only authorized users and service accounts.</li>
<li>Monitor Kubernetes API audit logs for suspicious <code>ResolutionRequest</code> creation events (see rule: &ldquo;Detect Suspicious ResolutionRequest Creation&rdquo;).</li>
<li>Implement network policies to restrict network access from the resolver pod to only necessary resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tekton</category><category>path-traversal</category><category>kubernetes</category><category>cve-2026-33211</category><category>cloud</category></item></channel></rss>