Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3762

Опубликовано: 28 сент. 2021
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.

Отчет

Only a single version of Red Hat Quay, 3.5.6 is affected by this vulnerability. All previous released versions of Red Hat Quay are not affected by this vulnerability. The overall vulnerability is rated as Critical for the ClairCore engine, but only rated Important for the Red Hat Quay product. In Red Hat Quay, Clair runs as the 'nobody' user in an unprivileged container, limiting the impact to modification of non-sensitives files in that container. Red Hat Advanced Cluster Security is not affected by this vulnerability. Quay.io is not affected by this vulnerability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2000795quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write

EPSS

Процентиль: 92%
0.08656
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.

CVSS3: 7.8
github
почти 4 года назад

Path traversal in claircore

EPSS

Процентиль: 92%
0.08656
Низкий

9.8 Critical

CVSS3