Impact
Users with the permission to create VMIs can construct VMI specs which allow them to read arbitrary files on the host. There are three main attack vectors:
Some path fields on the VMI spec were not properly validated and allowed passing in rela…