Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2022-4318
HistorySep 25, 2023 - 7:23 p.m.

CVE-2022-4318 Cri-o: /etc/passwd tampering privesc

2023-09-2519:23:02
CWE-538
redhat
github.com
2
cve-2022-4318
cri-o
vulnerability
/etc/passwd
tampering
privesc
environment variable

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.11",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.24.4-10.rhaos4.11.git1ed5ac5.el8",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openshift:4.11::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.12",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.25.2-9.rhaos4.12.git0a083f9.el9",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openshift:4.12::el8",
      "cpe:/a:redhat:openshift:4.12::el9"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 9",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "fence-agents",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:9"
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%