Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46030
HistoryMar 27, 2024 - 6:48 a.m.

Container Escape

2024-03-2706:48:04
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
10
containerfile validation
dummy image
symbolic link
host filesystem
read-write access
container escape

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%

github.com/containers/buildah is vulnerable to container escape. The vulnerability is due to improper Containerfile validation which allows a dummy image with a symbolic link to the host’s root filesystem as a mount source. This flaw enabling the mount operation to incorporate the host root filesystem inside the RUN step, thereby granting read-write access to the host filesystem and facilitating a full container escape during build time.

References

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%