Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1102

Опубликовано: 27 апр. 2018
Источник: redhat
CVSS3: 9.9
EPSS Низкий

Описание

A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.

Отчет

Package source-to-image as shipped in Red Hat Software Collections has been rated as Important, because it allows an attacker to get access to the victim's machine, but it requires user interaction.

Меры по смягчению последствий

Customers can turn off the source-to-image (S2I) build strategy to prevent access to the exploitable function. Information about how to disable the source-to-image build strategy is in the product documentation.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1562246source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go

EPSS

Процентиль: 79%
0.01263
Низкий

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 8 лет назад

A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.

CVSS3: 8.8
github
больше 3 лет назад

A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.

EPSS

Процентиль: 79%
0.01263
Низкий

9.9 Critical

CVSS3