Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-9407

Опубликовано: 01 окт. 2024
Источник: redhat
CVSS3: 4.7
EPSS Низкий

Описание

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

Отчет

This vulnerability is classified as moderate rather than important because it requires the attacker to have build privileges on the system, which inherently limits the scope of exploitation to trusted or semi-trusted users who already have some level of access. Additionally, while the flaw allows mounting and potential modification of host files, it is confined to the build process, meaning the exploitation window is limited to when a container is being built, not during runtime.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10buildahAffected
Red Hat Enterprise Linux 10podmanAffected
Red Hat OpenShift Container Platform 4buildahNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-docker-builderFix deferred
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:884605.11.2024
Red Hat Enterprise Linux 9podmanFixedRHSA-2024:905111.11.2024
Red Hat Enterprise Linux 9podmanFixedRHSA-2024:945412.11.2024
Red Hat Enterprise Linux 9buildahFixedRHSA-2024:945912.11.2024
Red Hat Enterprise Linux 9.4 Extended Update SupportbuildahFixedRHSA-2024:992619.11.2024
Red Hat OpenShift Container Platform 4.16rhcos-416.94.202411201433FixedRHSA-2024:1014726.11.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2315887Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction

EPSS

Процентиль: 5%
0.00025
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
9 месяцев назад

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
nvd
9 месяцев назад

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
debian
9 месяцев назад

A vulnerability exists in the bind-propagation option of the Dockerfil ...

CVSS3: 4.7
redos
8 месяцев назад

Уязвимость buildah

CVSS3: 4.7
redos
8 месяцев назад

Уязвимость podman

EPSS

Процентиль: 5%
0.00025
Низкий

4.7 Medium

CVSS3