Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhqcXItZzc2Mi1weHdw
containernetworking/cni improper limitation of path name
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Specific Go Packages Affected
github.com/containernetworking/cni/pkg/invoke
Permalink: https://github.com/advisories/GHSA-xjqr-g762-pxwpJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhqcXItZzc2Mi1weHdw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 7 months ago
CVSS Score: 7.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-xjqr-g762-pxwp, CVE-2021-20206
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-20206
- https://github.com/containernetworking/cni/pull/808
- https://bugzilla.redhat.com/show_bug.cgi?id=1919391
- https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549
- https://pkg.go.dev/vuln/GO-2022-0230
- https://github.com/advisories/GHSA-xjqr-g762-pxwp
Blast Radius: 30.2
Affected Packages
go:github.com/containernetworking/cni
Dependent packages: 1,272Dependent repositories: 15,794
Downloads:
Affected Version Ranges: < 0.8.1
Fixed in: 0.8.1
All affected versions: 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.3.0, 0.4.0, 0.5.0, 0.5.1, 0.5.2, 0.6.0, 0.7.0, 0.7.1, 0.8.0
All unaffected versions: 0.8.1, 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2