Lucene search

K
cvelistRedhatCVELIST:CVE-2021-20206
HistoryMar 26, 2021 - 9:34 p.m.

CVE-2021-20206

2021-03-2621:34:58
CWE-20
redhat
www.cve.org
8
cve-2021-20206
containernetworking/cni
path name limitation
network configuration
special elements
binaries
vulnerability
confidentiality
integrity
system availability

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

47.3%

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the โ€˜typeโ€™ field in the network configuration, it is possible to use special elements such as โ€œโ€ฆ/โ€ separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as โ€˜rebootโ€™. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CNA Affected

[
  {
    "product": "containernetworking-cni",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "containernetworking/cni 0.8.1"
      }
    ]
  }
]