// For flags

CVE-2019-18466

podman: resolving symlink in host filesystem leads to unexpected results of copy operation

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.

Se descubrió un problema en Podman en libpod versiones anteriores a la versión 1.6.0. Resuelve un enlace simbólico (symlink) en el contexto del host durante una operación de copia desde el contenedor hacia el host, porque se produce una operación glob no deseada. Un atacante podría crear una imagen de contenedor que contenga enlaces simbólicos particulares que, cuando sean copiados por parte de un usuario víctima hacia el sistema de archivos del host, pueden sobrescribir los archivos existentes con otros del host.

It was discovered that podman resolves a symlink in the host context during a copy operation from the container to the host. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-10-28 CVE Reserved
  • 2019-10-28 CVE Published
  • 2023-10-04 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libpod Project
Search vendor "Libpod Project"
Libpod
Search vendor "Libpod Project" for product "Libpod"
< 1.6.0
Search vendor "Libpod Project" for product "Libpod" and version " < 1.6.0"
-
Affected