Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-33j5-frrm-3wg2

Опубликовано: 30 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.2

Описание

A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

EPSS

Процентиль: 1%
0.00009
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 5.2
nvd
4 месяца назад

A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

EPSS

Процентиль: 1%
0.00009
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-276