mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
2.1 KiB
2.1 KiB
CVE-2021-30465
Description
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
POC
Reference
No PoCs from references.
Github
- https://github.com/43622283/awesome-cloud-native-security
- https://github.com/ARPSyndicate/cvemon
- https://github.com/FishAnonymous/CAShift-Record
- https://github.com/Lodestone-Team/safe_path_subset
- https://github.com/LouisLiuNova/container-escape-exploits
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/Metarget/metarget
- https://github.com/Srylax/safe-path
- https://github.com/UCloudDoc-Team/uk8s
- https://github.com/UCloudDocs/uk8s
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/apps4uco/safe-path
- https://github.com/asa1997/topgear_test
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/atwilsecurity/k8s-Security
- https://github.com/champtar/blog
- https://github.com/dli408097/k8s-security
- https://github.com/h4ckm310n/Container-Vulnerability-Exploit
- https://github.com/iridium-soda/container-escape-exploits
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/magnologan/awesome-k8s-security
- https://github.com/n0-traces/cve_monitor
- https://github.com/reni2study/Cloud-Native-Security2
- https://github.com/rosyrut/K8S-Security
- https://github.com/sunilbennur/kubernetes-Security-master
- https://github.com/superfish9/pt
- https://github.com/tbc957/k8s
- https://github.com/wllenyj/safe-path-rs