Lucene search

K
redhatcveRedhat.comRH:CVE-2024-23652
HistoryFeb 01, 2024 - 2:33 p.m.

CVE-2024-23652

2024-02-0114:33:15
redhat.com
access.redhat.com
48
moby builder toolkit
buildkit
dockerfile
malicious exploitation
arbitrary deletion
host system

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

21.7%

A vulnerability was found in the Moby Builder Toolkit, which arose from BuildKit’s attempts to clean up temporarily added directories after use. A malicious BuildKit frontend or Dockerfile using RUN --mount could deceive the feature responsible for removing empty files created for the mount points, potentially leading to removing a file outside the container and affecting the host system. Successful exploitation of this issue may result in the arbitrary deletion of files and directories on the underlying host OS when building an image using a malicious Dockerfile or upstream image (for example, when using FROM).

Mitigation

Do not use BuildKit frontends or Dockerfiles from untrusted sources.

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

21.7%