Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xjqr-g762-pxwp

Опубликовано: 15 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

containernetworking/cni improper limitation of path name

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Specific Go Packages Affected

github.com/containernetworking/cni/pkg/invoke

Пакеты

Наименование

github.com/containernetworking/cni

go
Затронутые версииВерсия исправления

< 0.8.1

0.8.1

EPSS

Процентиль: 31%
0.00121
Низкий

7.2 High

CVSS3

Дефекты

CWE-20
CWE-22

Связанные уязвимости

CVSS3: 7.2
ubuntu
почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
redhat
около 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
nvd
почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
debian
почти 5 лет назад

An improper limitation of path name flaw was found in containernetwork ...

suse-cvrf
около 3 лет назад

Security update for cni-plugins

EPSS

Процентиль: 31%
0.00121
Низкий

7.2 High

CVSS3

Дефекты

CWE-20
CWE-22