CVE-2021-3762
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
03/03/2022
Last modified:
30/01/2023
Description
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:* | 0.4.6 (including) | 0.4.8 (excluding) |
cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:* | 0.5.3 (including) | 0.5.5 (excluding) |
cpe:2.3:a:redhat:quay:3.5.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugzilla.redhat.com/show_bug.cgi?id=2000795
- https://github.com/quay/clair/pull/1379
- https://github.com/quay/clair/pull/1380
- https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821
- https://github.com/quay/claircore/pull/478
- https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83