目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2024-9675— Buildah 路径遍历漏洞

CVSS 7.8 · High EPSS 0.14% · P33
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2024-9675の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Buildah: buildah allows arbitrary directory mount
ソース: NVD (National Vulnerability Database)
脆弱性説明
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
对路径名的限制不恰当(路径遍历)
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Buildah 路径遍历漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Buildah是Buildah开源的一款支持构建OCI容器映像的工具。 Buildah存在路径遍历漏洞,该漏洞源于缓存挂载没有正确验证用户指定的缓存路径是否在我们的缓存目录中,允许容器文件中的RUN指令将主机中的任意目录挂载到容器中。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Red HatRed Hat Enterprise Linux 8 8100020241023085649.afee755d ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8060020241028154646.3b538bd8 ~ * cpe:/a:redhat:rhel_aus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 8060020241028154646.3b538bd8 ~ * cpe:/a:redhat:rhel_aus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8060020241028154646.3b538bd8 ~ * cpe:/a:redhat:rhel_aus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support 8080020241025064551.0f77c1b7 ~ * cpe:/a:redhat:rhel_eus:8.8::appstream
Red HatRed Hat Enterprise Linux 9 2:1.33.10-1.el9_4 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 4:4.9.4-16.el9_4 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 4:5.2.2-9.el9_5 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 2:1.37.5-1.el9_5 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 1:1.26.8-2.el9_0 ~ * cpe:/a:redhat:rhel_eus:9.0::appstream
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 2:4.2.0-5.el9_0.2 ~ * cpe:/a:redhat:rhel_eus:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 1:1.29.4-1.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 2:4.4.1-21.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat OpenShift Container Platform 4.12 v4.12.0-202503181728.p0.ge355452.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.12::el9
Red HatRed Hat OpenShift Container Platform 4.13 3:4.4.1-16.rhaos4.13.el9 ~ * cpe:/a:redhat:openshift:4.13::el8
Red HatRed Hat OpenShift Container Platform 4.13 v4.13.0-202503111300.p0.gb379980.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.13::el8
Red HatRed Hat OpenShift Container Platform 4.14 3:4.4.1-21.rhaos4.14.el9 ~ * cpe:/a:redhat:openshift:4.14::el9
Red HatRed Hat OpenShift Container Platform 4.14 v4.14.0-202503060906.p0.gb03f3f5.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.14::el9
Red HatRed Hat OpenShift Container Platform 4.15 3:4.4.1-32.rhaos4.15.el8 ~ * cpe:/a:redhat:openshift:4.15::el8
Red HatRed Hat OpenShift Container Platform 4.15 v4.15.0-202503060734.p0.gbc0b789.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.15::el8
Red HatRed Hat OpenShift Container Platform 4.16 4:4.9.4-12.rhaos4.16.el8 ~ * cpe:/a:redhat:openshift:4.16::el8
Red HatRed Hat OpenShift Container Platform 4.16 v4.16.0-202503121138.p0.g31c3c26.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.16::el9
Red HatRed Hat OpenShift Container Platform 4.17 5:5.2.2-1.rhaos4.17.el8 ~ * cpe:/a:redhat:openshift:4.17::el9
Red HatRed Hat OpenShift Container Platform 4.17 v4.17.0-202503041005.p0.gc3b0999.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.17::el9
Red HatRed Hat OpenShift Container Platform 4.18 v4.18.0-202503040802.p0.g6a5ec2a.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.18::el9
Red HatOpenShift Developer Tools and Services-cpe:/a:redhat:ocp_tools
Red HatOpenShift Developer Tools and Services-cpe:/a:redhat:ocp_tools
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4
Red HatRed Hat Quay 3-cpe:/a:redhat:quay:3

II. CVE-2024-9675の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2024-9675のインテリジェンス情報

登录查看更多情报信息。

IV. 関連脆弱性

V. CVE-2024-9675へのコメント

まだコメントはありません


コメントを残す