Miggo Logo

CVE-2024-1753:
Podman affected by CVE-2024-1753 container escape at build time

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.17953%
Published
3/28/2024
Updated
11/26/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/containers/podman/v4go< 4.9.44.9.4
github.com/containers/podman/v5go< 5.0.15.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GetBindMount function in internal/volumes/volumes.go was directly modified to address the CVE-2024-1753 vulnerability. The change from using filepath.Join and filepath.Clean to copier.Eval indicates a fix for improper link resolution or path traversal issues, making GetBindMount a key function for runtime detection of this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ Us*rs runnin* *ont*in*rs wit* root privil***s *llowin* * *ont*in*r to run wit* r***/writ* ****ss to t** *ost syst*m *il*s w**n s*linux is not *n**l**. Wit* s*linux *n**l**, som* r*** *

Reasoning

T** **t*in*Mount *un*tion in int*rn*l/volum*s/volum*s.*o w*s *ir**tly mo*i*i** to ***r*ss t** *V*-****-**** vuln*r**ility. T** ***n** *rom usin* *il*p*t*.Join *n* *il*p*t*.*l**n to *opi*r.*v*l in*i**t*s * *ix *or improp*r link r*solution or p*t* tr*v