CVE-2024-1753Link Following in Containers Buildah

Severity
8.6HIGHNVD
EPSS
0.1%
top 77.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18
Latest updateMar 28

Description

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages3 packages

🔴Vulnerability Details

7
GHSA
Podman affected by CVE-2024-1753 container escape at build time2024-03-28
OSV
Podman affected by CVE-2024-1753 container escape at build time2024-03-28
OSV
Container escape at build time in github.com/containers/buildah2024-03-22
OSV
Container escape at build time2024-03-19
GHSA
Container escape at build time2024-03-19

📋Vendor Advisories

3
Red Hat
buildah: full container escape at build time2024-03-18
Microsoft
Buildah: full container escape at build time2024-03-12
Debian
CVE-2024-1753: golang-github-containers-buildah - A flaw was found in Buildah (and subsequently Podman Build) which allows contain...2024
CVE-2024-1753 — Link Following in Containers Buildah | cvebase