Arbitrary Systemd Property Injection Vulnerability in cri-o

CVE-2024-3154
7.2HIGH

Key Information

Vendor
Red Hat
Status
Red Hat Openshift Container Platform 4.12
Red Hat Openshift Container Platform 4.14
Red Hat Openshift Container Platform 4.15
Red Hat Openshift Container Platform 3.11
Vendor
CVE Published:
26 April 2024

Badges

👾 Exploit Exists

Summary

A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.

Affected Version(s)

Red Hat OpenShift Container Platform 4.12 <= 0:1.25.5-16.2.rhaos4.12.gitcb09013.el8

Red Hat OpenShift Container Platform 4.14 <= 0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9

Red Hat OpenShift Container Platform 4.15 <= 0:1.28.6-2.rhaos4.15.git77bbb1c.el8

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Risk change from: null to: 7.2 - (HIGH)

  • Vulnerability published.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database0 Proof of Concept(s)

Credit

Red Hat would like to thank Akihiro Suda and Cédric Clerget for reporting this issue. Upstream acknowledges the CRI-O team as the original reporter.
.