Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-20206

Опубликовано: 26 мар. 2021
Источник: debian
EPSS Низкий

Описание

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-appc-cnifixed0.8.1-1package
golang-github-appc-cnipostponedbusterpackage
golang-github-appc-cnino-dsastretchpackage

Примечания

  • https://github.com/containernetworking/cni/pull/808

  • https://bugzilla.redhat.com/show_bug.cgi?id=1919391

EPSS

Процентиль: 31%
0.00121
Низкий

Связанные уязвимости

CVSS3: 7.2
ubuntu
почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
redhat
около 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
nvd
почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

suse-cvrf
около 3 лет назад

Security update for cni-plugins

suse-cvrf
около 3 лет назад

Security update for cni

EPSS

Процентиль: 31%
0.00121
Низкий