7.2
CVSSv3

CVE-2021-20206

Published: 26/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

An improper limitation of path name flaw was found in containernetworking/cni in versions prior to 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an malicious user to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxfoundation container network interface

Vendor Advisories

Debian Bug report logs - #983659 golang-github-appc-cni: CVE-2021-20206 Package: src:golang-github-appc-cni; Maintainer for src:golang-github-appc-cni is Debian Go Packaging Team <team+pkg-go@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 28 Feb 2021 08:39:01 UTC Severity: impor ...
Synopsis Moderate: Red Hat OpenShift support for Windows Containers 205 [security update] Type/Severity Security Advisory: Moderate Topic The components for Red Hat OpenShift support for Windows Containers 205 are now available This product release includes a moderate security update for the following packages: windows-machine-config-ope ...
Synopsis Moderate: OpenShift Container Platform 4743 security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4743 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container Platfo ...