Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-9566

Опубликовано: 04 сент. 2025
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

Отчет

The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).

Меры по смягчению последствий

Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8container-tools:rhel8/podmanAffected
Red Hat OpenShift Container Platform 4podmanAffected
Red Hat OpenShift Container Platform 4rhcosAffected
Red Hat OpenShift Dev Spacesdevspaces/udi-base-rhel9Affected
Red Hat OpenShift Dev Spacesdevspaces/udi-rhel9Affected
Red Hat Enterprise Linux 10podmanFixedRHSA-2025:1590116.09.2025
Red Hat Enterprise Linux 9podmanFixedRHSA-2025:1590016.09.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2393152podman: Podman kube play command may overwrite host files

EPSS

Процентиль: 18%
0.00059
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
12 дней назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
nvd
12 дней назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

msrc
11 дней назад

Podman: podman kube play command may overwrite host files

CVSS3: 8.1
debian
12 дней назад

There's a vulnerability in podman where an attacker may use the kube p ...

CVSS3: 8.1
github
13 дней назад

podman kube play symlink traversal vulnerability

EPSS

Процентиль: 18%
0.00059
Низкий

8.1 High

CVSS3