Lucene search

K
githubGitHub Advisory DatabaseGHSA-RH5F-2W6R-Q7VJ
HistoryMay 24, 2022 - 4:51 p.m.

Podman Path Traversal Vulnerability leads to arbitrary file read/write

2022-05-2416:51:48
CWE-22
CWE-59
GitHub Advisory Database
github.com
7
podman
path traversal
vulnerability
arbitrary file
symlinks
containers
host filesystem
administrator
software

CVSS2

2.6

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:P/A:N

CVSS3

7.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS

0.001

Percentile

23.6%

A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.

Affected configurations

Vulners
Node
containerspodmanRange<1.4.0
VendorProductVersionCPE
containerspodman*cpe:2.3:a:containers:podman:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:P/A:N

CVSS3

7.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS

0.001

Percentile

23.6%