CVE-2024-25940
bhyveload(8) host file access
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
`bhyveload -h ` se puede usar para otorgar acceso al cargador al árbol de directorios en el host. Las versiones afectadas de bhyveload(8) no intentan restringir el acceso del cargador a , lo que le permite leer cualquier archivo al que el usuario host tenga acceso. En el modelo bhyveload(8), el host proporciona un userboot.so para arrancar, pero los scripts del cargador generalmente provienen de la imagen del invitado. Se podría utilizar un script creado con fines malintencionados para extraer datos confidenciales del host al que puede acceder el usuario que ejecuta bhyhveload(8), que suele ser la raíz del sistema.
`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
bhyveload -hmay be used to grant loader access to thedirectory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-02-13 CVE Reserved
- 2024-02-14 CVE Published
- 2025-02-13 CVE Updated
- 2025-06-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-922: Insecure Storage of Sensitive Information
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20240419-0004 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc | 2024-04-19 |