Описание
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
Ссылки
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 0.4.6 (включая) до 0.4.8 (исключая)Версия от 0.5.3 (включая) до 0.5.5 (исключая)
Одно из
cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:redhat:quay:3.5.6:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.08656
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-22
CWE-22
Связанные уязвимости
CVSS3: 9.8
redhat
больше 4 лет назад
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
EPSS
Процентиль: 92%
0.08656
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-22
CWE-22