Описание
An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes.
Ссылки
- ExploitIssue TrackingThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.11.3 (включая)
Одно из
cpe:2.3:a:katacontainers:kata_containers:*:*:*:*:*:*:*:*
cpe:2.3:a:katacontainers:kata_containers:2.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:katacontainers:kata_containers:2.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:katacontainers:kata_containers:2.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:katacontainers:kata_containers:2.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:katacontainers:kata_containers:2.0.0:rc1:*:*:*:*:*:*
EPSS
Процентиль: 74%
0.00845
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
NVD-CWE-noinfo
EPSS
Процентиль: 74%
0.00845
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
NVD-CWE-noinfo