cve/2020/CVE-2020-2023.md

20 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-2023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2023)
![](https://img.shields.io/static/v1?label=Product&message=Kata%20Containers&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.11%3C%201.11.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-250%20Execution%20with%20Unnecessary%20Privileges&color=brighgreen)
### Description
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
### POC
#### Reference
- https://github.com/kata-containers/runtime/pull/2477
#### Github
- https://github.com/Metarget/metarget
- https://github.com/brant-ruan/awesome-container-escape
- https://github.com/ssst0n3/kata-cve-2020-2023-poc