An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-1255 An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Github GHSA Github GHSA GHSA-xjqr-g762-pxwp containernetworking/cni improper limitation of path name
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:30:07.575Z

Reserved: 2020-12-17T00:00:00

Link: CVE-2021-20206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-26T22:15:12.617

Modified: 2024-11-21T05:46:07.850

Link: CVE-2021-20206

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-02-05T00:00:00Z

Links: CVE-2021-20206 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses