Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4c2p-6qpx-xc78

Опубликовано: 23 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.2

Описание

A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

EPSS

Процентиль: 0%
0.00005
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 5.2
nvd
4 месяца назад

A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

EPSS

Процентиль: 0%
0.00005
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-276