2024-10-04 14:03:27 +00:00

64 lines
2.7 KiB
JSON

{
"id": "CVE-2024-9407",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-10-01T21:15:08.530",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad en la opci\u00f3n bind-propagation de la instrucci\u00f3n RUN --mount de Dockerfile. El sistema no valida correctamente la entrada que se pasa a esta opci\u00f3n, lo que permite a los usuarios pasar par\u00e1metros arbitrarios a la instrucci\u00f3n mount. Este problema se puede aprovechar para montar directorios confidenciales del host en un contenedor durante el proceso de compilaci\u00f3n y, en algunos casos, modificar el contenido de esos archivos montados. Incluso si se utiliza SELinux, esta vulnerabilidad puede eludir su protecci\u00f3n al permitir que se vuelva a etiquetar el directorio de origen para dar al contenedor acceso a los archivos del host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-9407",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315887",
"source": "secalert@redhat.com"
}
]
}