Lucene search

K
githubGitHub Advisory DatabaseGHSA-F7QW-JJ9C-RPQ9
HistoryMay 31, 2023 - 11:38 p.m.

In Lima, a malicious disk image could read a single file on the host filesystem as a qcow2/vmdk backing file

2023-05-3123:38:28
CWE-552
GitHub Advisory Database
github.com
10
lima
vulnerability
host filesystem
disk image
qcow2
vmdk
backing file
patch
workaround
security

2.7 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

19.7%

> Note
>
> The official templates of Lima, and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue.

Impact

A virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host.

To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string.
As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via /dev/rdiskN.
Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file.

Patches

Patched in Lima v0.16.0, by prohibiting using a backing file path in the VM base image.

Workarounds

Do not use an untrusted disk image.

Affected configurations

Vulners
Node
github.com\/limavm\/limaRange<0.16.0
CPENameOperatorVersion
github.com/lima-vm/limalt0.16.0

2.7 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

19.7%

Related for GHSA-F7QW-JJ9C-RPQ9