Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-32955

Опубликовано: 21 апр. 2025
Источник: redhat
CVSS3: 6
EPSS Низкий

Описание

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Versions from 0.12.0 to before 2.12.0 are vulnerable to disable-sudo bypass. Harden-Runner includes a policy option disable-sudo to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction. This issue has been patched in version 2.12.0.

Меры по смягчению последствий

This vulnerability has been fixed in Harden-Runner version v2.12.0. Users should migrate to the stronger disable-sudo-and-containers policy. This setting: • Disables sudo access, • Removes access to dockerd and containerd sockets, • Uninstalls Docker from the runner entirely, preventing container-based privilege escalation paths.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/pathservice-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/ui-rhel9Fix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-gateway-opa-rhel8Fix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-gateway-rhel8Fix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-jaeger-query-rhel8Fix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-operator-bundleFix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-query-rhel8Fix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-rhel8Fix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-rhel8-operatorFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-268
Дефект:
CWE-269
https://bugzilla.redhat.com/show_bug.cgi?id=2361532Harden-Runner: Harden-Runner Evasion of 'disable-sudo' policy

EPSS

Процентиль: 3%
0.00019
Низкий

6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6
nvd
5 месяцев назад

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Versions from 0.12.0 to before 2.12.0 are vulnerable to `disable-sudo` bypass. Harden-Runner includes a policy option `disable-sudo` to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction. This issue has been patched in version 2.12.0.

CVSS3: 6
github
5 месяцев назад

Harden-Runner allows evasion of 'disable-sudo' policy

EPSS

Процентиль: 3%
0.00019
Низкий

6 Medium

CVSS3