Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-8907

Опубликовано: 22 июн. 2020
Источник: nvd
CVSS3: 7.8
CVSS2: 6.9
EPSS Низкий

Описание

A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:google:guest-oslogin:*:*:*:*:*:*:*:*
Версия от 20190304.00 (включая) до 20200507.00 (включая)
Конфигурация 2

Одно из

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

EPSS

Процентиль: 25%
0.00086
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-276
CWE-276

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.

CVSS3: 7.8
debian
больше 5 лет назад

A vulnerability in Google Cloud Platform's guest-oslogin versions betw ...

CVSS3: 7.8
github
больше 3 лет назад

A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.

CVSS3: 7.8
fstec
больше 5 лет назад

Уязвимость гостевой среды входа в Google Cloud OS guest-oslogin, связанная с неправильными настройками прав доступа по умолчанию, позволяющая нарушителю повысить свои привилегии

suse-cvrf
больше 5 лет назад

Security update for google-compute-engine

EPSS

Процентиль: 25%
0.00086
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-276
CWE-276