Lucene search

K
nvd[email protected]NVD:CVE-2021-3762
HistoryMar 03, 2022 - 10:15 p.m.

CVE-2021-3762

2022-03-0322:15:08
CWE-22
web.nvd.nist.gov
9
directory traversal
claircore
clair
arbitrary file write
remote code execution

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.069

Percentile

93.9%

A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.

Affected configurations

Nvd
Node
redhatclairRange0.4.60.4.8
OR
redhatclairRange0.5.30.5.5
Node
redhatquayMatch3.5.6
VendorProductVersionCPE
redhatclair*cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*
redhatquay3.5.6cpe:2.3:a:redhat:quay:3.5.6:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.069

Percentile

93.9%