Lucene search

K
redhatcveRedhat.comRH:CVE-2024-23652
HistoryFeb 01, 2024 - 2:33 p.m.

CVE-2024-23652

2024-02-0114:33:15
redhat.com
access.redhat.com
42
moby builder toolkit
buildkit
dockerfile
malicious exploitation
arbitrary deletion
host system

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.8%

A vulnerability was found in the Moby Builder Toolkit, which arose from BuildKit’s attempts to clean up temporarily added directories after use. A malicious BuildKit frontend or Dockerfile using RUN --mount could deceive the feature responsible for removing empty files created for the mount points, potentially leading to removing a file outside the container and affecting the host system. Successful exploitation of this issue may result in the arbitrary deletion of files and directories on the underlying host OS when building an image using a malicious Dockerfile or upstream image (for example, when using FROM).

Mitigation

Do not use BuildKit frontends or Dockerfiles from untrusted sources.

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.8%