CVE-2021-20188Incorrect Authorization in Project Podman

Severity
7.0HIGHNVD
EPSS
0.1%
top 75.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateAug 21

Description

A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages4 packages

CVEListV5podman_project/podmanpodman 1.7.0
Debianlibpod_project/libpod< 2.0.2+dfsg1-3+1

Also affects: Openshift Container Platform 3.11, Enterprise Linux 7.0, 8.0

Patches

🔴Vulnerability Details

5
OSV
Improper Authorization in github.com/containers/libpod2024-08-21
GHSA
Improper Authorization in github.com/containers/libpod2021-05-18
OSV
Improper Authorization in github.com/containers/libpod2021-05-18
CVEList
CVE-2021-20188: A flaw was found in podman before 12021-02-11
OSV
CVE-2021-20188: A flaw was found in podman before 12021-02-11

📋Vendor Advisories

2
Red Hat
podman: container users permissions are not respected in privileged containers2021-02-10
Debian
CVE-2021-20188: libpod - A flaw was found in podman before 1.7.0. File permissions for non-root users run...2021