GHSA-rh5f-2w6r-q7vj

Suggest an improvement
Source
https://github.com/advisories/GHSA-rh5f-2w6r-q7vj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rh5f-2w6r-q7vj/GHSA-rh5f-2w6r-q7vj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rh5f-2w6r-q7vj
Aliases
Published
2022-05-24T16:51:48Z
Modified
2024-08-20T20:58:56.663574Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Podman Path Traversal Vulnerability leads to arbitrary file read/write
Details

A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.

Database specific
{
    "nvd_published_at": "2019-07-30T23:15:00Z",
    "cwe_ids": [
        "CWE-22",
        "CWE-59"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-14T22:12:52Z"
}
References

Affected packages

Go / github.com/containers/podman

Package

Name
github.com/containers/podman
View open source insights on deps.dev
Purl
pkg:golang/github.com/containers/podman

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0