Arbitrary Systemd Property Injection Vulnerability in cri-o
CVE-2024-3154
7.2HIGH
Key Information
- Vendor
- Red Hat
- Status
- Red Hat Openshift Container Platform 4.12
- Red Hat Openshift Container Platform 4.14
- Red Hat Openshift Container Platform 4.15
- Red Hat Openshift Container Platform 3.11
- Vendor
- CVE Published:
- 26 April 2024
Badges
👾 Exploit Exists
Summary
A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
Affected Version(s)
Red Hat OpenShift Container Platform 4.12 <= 0:1.25.5-16.2.rhaos4.12.gitcb09013.el8
Red Hat OpenShift Container Platform 4.14 <= 0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9
Red Hat OpenShift Container Platform 4.15 <= 0:1.28.6-2.rhaos4.15.git77bbb1c.el8
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Collectors
NVD DatabaseMitre Database0 Proof of Concept(s)
Credit
Red Hat would like to thank Akihiro Suda and Cédric Clerget for reporting this issue. Upstream acknowledges the CRI-O team as the original reporter.