Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1798

Опубликовано: 08 авг. 2022
Источник: redhat
CVSS3: 7.7
EPSS Низкий

Описание

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.

An arbitrary file read vulnerability was found in the kubeVirt API. This flaw makes it possible to use the kubeVirt API to provide access to host files (like /etc/passwd, for example) in a KubeVirt VM as a disk device that can be written to and read from.

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2117872kubeVirt: Arbitrary file read on the host from KubeVirt VMs

EPSS

Процентиль: 34%
0.00139
Низкий

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 8.7
nvd
больше 3 лет назад

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.

CVSS3: 6.5
msrc
больше 3 лет назад

Path Traversal vulnerability in Kubevirt

CVSS3: 6.5
github
больше 3 лет назад

Duplicate Advisory: KubeVirt arbitrary host file read from the VM

suse-cvrf
больше 3 лет назад

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container

suse-cvrf
больше 3 лет назад

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container

EPSS

Процентиль: 34%
0.00139
Низкий

7.7 High

CVSS3