Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-887v-3w44-3xrw

Опубликовано: 02 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.2

Описание

A container privilege escalation flaw was found in certain CodeReady Workspaces images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

A container privilege escalation flaw was found in certain CodeReady Workspaces images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

EPSS

Процентиль: 0%
0.00005
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 5.2
nvd
2 месяца назад

A container privilege escalation flaw was found in certain CodeReady Workspaces images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

EPSS

Процентиль: 0%
0.00005
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-276