<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tekton — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tekton/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tekton/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL</title><link>https://feed.craftedsignal.io/briefs/2026-04-tekton-api-token-leak/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tekton-api-token-leak/</guid><description>The Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.</description><content:encoded><![CDATA[<p>A vulnerability exists in Tekton Pipelines&rsquo; git resolver (versions v1.0.0 through v1.10.0) where the system-configured Git API token is sent to a user-controlled <code>serverURL</code> when the user omits the <code>token</code> parameter. This allows a malicious tenant with TaskRun or PipelineRun create permissions to exfiltrate the shared API token (GitHub PAT, GitLab token, etc.) by pointing <code>serverURL</code> to an attacker-controlled endpoint. The attacker can then use this token to gain unauthorized access to private repositories, potentially exposing source code, secrets, and CI/CD configurations. This vulnerability is similar to GHSA-j5q5-j9gm-2w5c, where credentials could be exfiltrated. The vulnerability resides in the <code>ResolveAPIGit()</code> function within <code>pkg/resolution/resolver/git/resolver.go</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains permission to create TaskRuns or PipelineRuns within a Tekton Pipelines namespace.</li>
<li>Attacker crafts a malicious TaskRun or PipelineRun configuration.</li>
<li>The configuration specifies the git resolver in API mode.</li>
<li>The configuration omits the <code>token</code> parameter but includes a <code>serverURL</code> pointing to an attacker-controlled endpoint.</li>
<li>Tekton Pipelines executes the TaskRun or PipelineRun, triggering the git resolver.</li>
<li>The <code>ResolveAPIGit()</code> function retrieves the system-configured Git API token using <code>getAPIToken()</code>.</li>
<li>The function creates an SCM client pointed at the attacker-controlled <code>serverURL</code> with the system token as an <code>Authorization</code> header.</li>
<li>Subsequent API calls from the resolver to the attacker-controlled URL transmit the system token, allowing the attacker to capture it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to exfiltrate the system Git API token (GitHub PAT, GitLab token, etc.). The exfiltrated token can be used to access private repositories, potentially leading to the exposure of sensitive information like source code, secrets, and CI/CD configurations.  This can lead to supply chain compromise, data breaches, or other unauthorized activities. All Tekton Pipeline instances running versions v1.0.0 through v1.10.0 are potentially vulnerable if a system-level API token is configured.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Do not configure a system-level API token</strong> in the git resolver ConfigMap. Instead, require all users to provide their own tokens via the <code>token</code> parameter, as suggested in the advisory&rsquo;s workaround section.</li>
<li><strong>Restrict TaskRun creation</strong> to limit which users or ServiceAccounts can create TaskRuns and PipelineRuns that use the git resolver, as recommended in the advisory&rsquo;s workaround section.</li>
<li><strong>Apply NetworkPolicy</strong> to the <code>tekton-pipelines-resolvers</code> namespace to restrict outbound traffic to known-good Git servers only, mitigating the risk of token exfiltration to arbitrary <code>serverURL</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tekton</category><category>git</category><category>credential-access</category><category>api-token</category></item><item><title>Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tekton-credential-leak/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tekton-credential-leak/</guid><description>Tekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.</description><content:encoded><![CDATA[<p>Tekton Pipelines, a Kubernetes-style resource for declaring CI/CD pipelines, contains a vulnerability (CVE-2026-40161) in its git resolver component. Specifically, versions 1.0.0 to 1.10.0 are affected. When operating in API mode, the resolver inadvertently sends the system-configured Git API token (e.g., GitHub PAT, GitLab token) to a server specified by the user if the token parameter is omitted. This allows an attacker with TaskRun or PipelineRun creation privileges to exfiltrate the shared API token by directing the serverURL to an attacker-controlled endpoint. The vulnerability allows for the potential compromise of CI/CD pipelines and related infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a Kubernetes tenant with permissions to create TaskRun or PipelineRun resources within Tekton Pipelines.</li>
<li>The attacker crafts a malicious TaskRun or PipelineRun configuration.</li>
<li>The configuration leverages the Tekton Pipelines git resolver in API mode.</li>
<li>The attacker omits the <code>token</code> parameter in the git resolver configuration, forcing the system to use the system-configured Git API token.</li>
<li>The attacker sets the <code>serverURL</code> parameter to an attacker-controlled endpoint.</li>
<li>Tekton Pipelines, upon execution of the TaskRun or PipelineRun, sends the system-configured Git API token to the attacker-controlled <code>serverURL</code>.</li>
<li>The attacker&rsquo;s server logs and captures the leaked Git API token.</li>
<li>The attacker uses the exfiltrated token to access and potentially compromise Git repositories or other services authenticated by the token.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40161 allows an attacker to steal the system-configured Git API token used by Tekton Pipelines. This could lead to unauthorized access to Git repositories, the modification of code, and the potential compromise of the entire CI/CD pipeline. Given Tekton&rsquo;s widespread adoption, a successful attack could affect numerous organizations using the vulnerable versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to a version greater than 1.10.0 to remediate CVE-2026-40161.</li>
<li>Implement strict access controls within the Kubernetes cluster to limit TaskRun and PipelineRun creation privileges to authorized users only.</li>
<li>Monitor network traffic originating from Tekton Pipeline pods for connections to unusual or untrusted <code>serverURL</code> destinations as specified in CVE-2026-40161. Create a network connection rule for this.</li>
<li>Review Tekton Pipeline configurations for suspicious <code>serverURL</code> parameters using a file monitoring rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tekton</category><category>credential-access</category><category>cve-2026-40161</category></item><item><title>Tekton Pipelines Git Resolver Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</link><pubDate>Tue, 24 Mar 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</guid><description>The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.</description><content:encoded><![CDATA[<p>The Tekton Pipelines project provides Kubernetes-style resources for declaring CI/CD pipelines. A path traversal vulnerability exists in the git resolver component, tracked as CVE-2026-33211. This vulnerability affects Tekton Pipelines versions 1.0.0 and prior to 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. An attacker with the ability to create <code>ResolutionRequests</code> (e.g., through <code>TaskRuns</code> or <code>PipelineRuns</code> that utilize the git resolver) can exploit this flaw to read any file from the resolver pod&rsquo;s file system. A successful exploit allows attackers to retrieve sensitive information, such as ServiceAccount tokens, which are base64-encoded and returned in <code>resolutionrequest.status.data</code>. The vulnerability has been patched in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. This poses a significant risk in multi-tenant environments where lateral movement and privilege escalation are possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create <code>TaskRuns</code> or <code>PipelineRuns</code> within a Tekton Pipelines environment.</li>
<li>The attacker crafts a malicious <code>ResolutionRequest</code> that leverages the git resolver.</li>
<li>Within the <code>ResolutionRequest</code>, the attacker injects a path traversal sequence into the <code>pathInRepo</code> parameter, such as &ldquo;../../../../etc/passwd&rdquo;.</li>
<li>The git resolver attempts to resolve the resource using the provided path.</li>
<li>Due to the path traversal vulnerability, the resolver accesses the file specified by the attacker on the resolver pod&rsquo;s file system.</li>
<li>The contents of the accessed file are read by the resolver.</li>
<li>The resolver encodes the file content in base64.</li>
<li>The base64-encoded content is returned in the <code>resolutionrequest.status.data</code> field, allowing the attacker to retrieve the content. This can include sensitive files such as ServiceAccount tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33211 allows attackers to read arbitrary files from the Tekton Pipelines resolver pod. This can lead to the compromise of sensitive information, including ServiceAccount tokens. If ServiceAccount tokens are compromised, attackers can potentially gain unauthorized access to Kubernetes resources, leading to privilege escalation, lateral movement within the cluster, and potential data exfiltration. The impact is especially high in multi-tenant environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2 or later to patch CVE-2026-33211.</li>
<li>Implement strict RBAC policies to limit the ability to create <code>TaskRuns</code> and <code>PipelineRuns</code> to only authorized users and service accounts.</li>
<li>Monitor Kubernetes API audit logs for suspicious <code>ResolutionRequest</code> creation events (see rule: &ldquo;Detect Suspicious ResolutionRequest Creation&rdquo;).</li>
<li>Implement network policies to restrict network access from the resolver pod to only necessary resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tekton</category><category>path-traversal</category><category>kubernetes</category><category>cve-2026-33211</category><category>cloud</category></item></channel></rss>