Lucene search

K
githubGitHub Advisory DatabaseGHSA-CM9X-C3RH-7RC4
HistoryDec 29, 2022 - 1:49 a.m.

CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation

2022-12-2901:49:47
CWE-538
CWE-913
GitHub Advisory Database
github.com
25
cri-o
privilege escalation
/etc/passwd tampering
environment variable
admission validation
selinux

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Impact

It is possible to craft an environment variable with newlines to add entries to a container’s /etc/passwd. It is possible to circumvent admission validation of username/UID by adding such an entry.

Note: because the pod author is in control of the container’s /etc/passwd, this is not considered a new risk factor. However, this advisory is being opened for transparency and as a way of tracking fixes.

Patches

1.26.0 will have the fix. More patches will be posted as they’re available.

Workarounds

Additional security controls like SELinux should prevent any damage a container is able to do with root on the host. Using SELinux is recommended because this class of attack is already possible by manually editing the container’s /etc/passwd

References

Affected configurations

Vulners
Node
kubernetescri-oRange<1.26.0
CPENameOperatorVersion
github.com/cri-o/cri-olt1.26.0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%