2.7 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
19.7%
> Note
>
> The official templates of Lima, and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue.
A virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host.
To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string.
As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via /dev/rdiskN
.
Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file.
Patched in Lima v0.16.0, by prohibiting using a backing file path in the VM base image.
Do not use an untrusted disk image.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/lima-vm/lima | lt | 0.16.0 |