Lucene search

K
cvelistRedhatCVELIST:CVE-2024-3154
HistoryApr 26, 2024 - 3:12 a.m.

CVE-2024-3154 Cri-o: arbitrary command injection via pod annotation

2024-04-2603:12:38
CWE-77
redhat
www.cve.org
1
cve-2024-3154
cri-o
command injection
systemd property
pod annotation
arbitrary action

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%

A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.12",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.25.5-16.2.rhaos4.12.gitcb09013.el8",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openshift:4.12::el9",
      "cpe:/a:redhat:openshift:4.12::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.13",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.26.5-16.2.rhaos4.13.git67e2a9d.el8",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openshift:4.13::el8",
      "cpe:/a:redhat:openshift:4.13::el9"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.14",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openshift:4.14::el8",
      "cpe:/a:redhat:openshift:4.14::el9"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.15",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.28.6-2.rhaos4.15.git77bbb1c.el8",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openshift:4.15::el8",
      "cpe:/a:redhat:openshift:4.15::el9"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 3.11",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "cri-o",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:openshift:3.11"
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%