Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20206

Опубликовано: 05 фев. 2021
Источник: redhat
CVSS3: 7.2
EPSS Низкий

Описание

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the type field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as reboot. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Отчет

OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Moderate. The fix for podman was released as a part of OpenShift 4.8 and is included in future releases.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-cniAffected
Red Hat Advanced Cluster Management for Kubernetes 2cniNot affected
Red Hat Enterprise Linux 7buildahOut of support scope
Red Hat Enterprise Linux 7containernetworking-pluginsOut of support scope
Red Hat Enterprise Linux 7podmanOut of support scope
Red Hat Enterprise Linux 8container-tools:1.0/buildahWill not fix
Red Hat Enterprise Linux 8container-tools:1.0/containernetworking-pluginsOut of support scope
Red Hat Enterprise Linux 8container-tools:1.0/podmanOut of support scope
Red Hat Enterprise Linux 8container-tools:2.0/buildahWill not fix
Red Hat Enterprise Linux 8container-tools:2.0/containernetworking-pluginsAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1919391containernetworking-cni: Arbitrary path injection via type field in CNI configuration

EPSS

Процентиль: 31%
0.00121
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
nvd
почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
debian
почти 5 лет назад

An improper limitation of path name flaw was found in containernetwork ...

suse-cvrf
около 3 лет назад

Security update for cni-plugins

suse-cvrf
около 3 лет назад

Security update for cni

EPSS

Процентиль: 31%
0.00121
Низкий

7.2 High

CVSS3