Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3762 (GCVE-0-2021-3762)
Vulnerability from cvelistv5
Published
2022-03-03 21:41
Modified
2024-08-03 17:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | quay/claircore |
Version: Affects v0.4.6 and higher, v0.5.3 and higher | Fixedin claircore v0.4.8, v0.5.5. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quay/claircore/pull/478" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quay/clair/pull/1379" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quay/clair/pull/1380" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "quay/claircore", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects v0.4.6 and higher, v0.5.3 and higher | Fixedin claircore v0.4.8, v0.5.5." } ] } ], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 - Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-03T21:41:19", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quay/claircore/pull/478" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quay/clair/pull/1379" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quay/clair/pull/1380" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-3762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "quay/claircore", "version": { "version_data": [ { "version_value": "Affects v0.4.6 and higher, v0.5.3 and higher | Fixedin claircore v0.4.8, v0.5.5." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 - Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "name": "https://github.com/quay/claircore/pull/478", "refsource": "MISC", "url": "https://github.com/quay/claircore/pull/478" }, { "name": "https://github.com/quay/clair/pull/1379", "refsource": "MISC", "url": "https://github.com/quay/clair/pull/1379" }, { "name": "https://github.com/quay/clair/pull/1380", "refsource": "MISC", "url": "https://github.com/quay/clair/pull/1380" }, { "name": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821", "refsource": "MISC", "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "name": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83", "refsource": "MISC", "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-3762", "datePublished": "2022-03-03T21:41:19", "dateReserved": "2021-09-03T00:00:00", "dateUpdated": "2024-08-03T17:09:08.890Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-3762\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-03-03T22:15:08.467\",\"lastModified\":\"2024-11-21T06:22:21.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad de salto de directorio en el motor ClairCore de Clair. Un atacante puede explotar esto al suministrar una imagen de contenedor dise\u00f1ada que, cuando es escaneada por Clair, permite una escritura de archivos arbitrarios en el sistema de archivos, permitiendo potencialmente una ejecuci\u00f3n de c\u00f3digo remota\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.4.6\",\"versionEndExcluding\":\"0.4.8\",\"matchCriteriaId\":\"DC3746AC-E2FF-414F-8707-CE382C70441B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.5.3\",\"versionEndExcluding\":\"0.5.5\",\"matchCriteriaId\":\"A6A00809-457A-4305-94EF-7E523A8B1691\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:quay:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414D3D0A-77F7-4D92-88D6-647F293A86B4\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2000795\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/clair/pull/1379\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/clair/pull/1380\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/claircore/pull/478\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2000795\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/clair/pull/1379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/clair/pull/1380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/quay/claircore/pull/478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
gsd-2021-3762
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-3762", "description": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "id": "GSD-2021-3762", "references": [ "https://access.redhat.com/errata/RHSA-2021:3665" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-3762" ], "details": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "id": "GSD-2021-3762", "modified": "2023-12-13T01:23:34.864993Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-3762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "quay/claircore", "version": { "version_data": [ { "version_value": "Affects v0.4.6 and higher, v0.5.3 and higher | Fixedin claircore v0.4.8, v0.5.5." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 - Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "name": "https://github.com/quay/claircore/pull/478", "refsource": "MISC", "url": "https://github.com/quay/claircore/pull/478" }, { "name": "https://github.com/quay/clair/pull/1379", "refsource": "MISC", "url": "https://github.com/quay/clair/pull/1379" }, { "name": "https://github.com/quay/clair/pull/1380", "refsource": "MISC", "url": "https://github.com/quay/clair/pull/1380" }, { "name": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821", "refsource": "MISC", "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "name": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83", "refsource": "MISC", "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v0.4.6 \u003cv0.4.8 || \u003e=v0.5.3 \u003cv0.5.5", "affected_versions": "All versions starting from 0.4.6 before 0.4.8, all versions starting from 0.5.3 before 0.5.5", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-22", "CWE-937" ], "date": "2023-01-30", "description": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "fixed_versions": [ "v0.4.8", "v0.5.5" ], "identifier": "CVE-2021-3762", "identifiers": [ "CVE-2021-3762" ], "not_impacted": "", "package_slug": "go/github.com/quay/clair", "pubdate": "2022-03-03", "solution": "Upgrade to versions 0.4.8, 0.5.5 or above.", "title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-3762", "https://bugzilla.redhat.com/show_bug.cgi?id=2000795", "https://github.com/quay/clair/pull/1380", "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821", "https://github.com/quay/claircore/pull/478", "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83", "https://github.com/quay/clair/pull/1379" ], "uuid": "d9b3e24d-08c2-4191-8120-63579c6da877", "versions": [] }, { "affected_range": "\u003cv0.4.8", "affected_versions": "All versions before 0.4.8", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-22", "CWE-78", "CWE-937" ], "date": "2022-03-21", "description": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "fixed_versions": [ "v0.4.8" ], "identifier": "CVE-2021-3762", "identifiers": [ "GHSA-mq47-6wwv-v79w", "CVE-2021-3762" ], "not_impacted": "All versions starting from 0.4.8", "package_slug": "go/github.com/quay/claircore", "pubdate": "2022-03-04", "solution": "Upgrade to version 0.4.8 or above.", "title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-3762", "https://github.com/quay/clair/pull/1379", "https://github.com/quay/clair/pull/1380", "https://github.com/quay/claircore/pull/478", "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821", "https://bugzilla.redhat.com/show_bug.cgi?id=2000795", "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83", "https://github.com/quay/claircore/commit/dff671c665141f126c072de8a744855d4916c9c7", "https://github.com/advisories/GHSA-mq47-6wwv-v79w" ], "uuid": "a8d511e2-4b0a-4d93-8ccf-08cd51094e9a", "versions": [ { "commit": { "sha": "413cd93b3cf7defaa8cd91a61078eac241a81513", "tags": [ "v0.4.8" ], "timestamp": "20210928171726" }, "number": "v0.4.8" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.4.8", "versionStartIncluding": "0.4.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.5.5", "versionStartIncluding": "0.5.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:quay:3.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-3762" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "name": "https://github.com/quay/clair/pull/1380", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/clair/pull/1380" }, { "name": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "name": "https://github.com/quay/claircore/pull/478", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/claircore/pull/478" }, { "name": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" }, { "name": "https://github.com/quay/clair/pull/1379", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/clair/pull/1379" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-30T19:17Z", "publishedDate": "2022-03-03T22:15Z" } } }
rhsa-2021_3665
Vulnerability from csaf_redhat
Published
2021-09-28 21:19
Modified
2024-11-13 23:32
Summary
Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update
Notes
Topic
Red Hat Quay 3.5.7 is now available with security update, bug fixes and various enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Quay 3.5.7 includes:
Security Fix(es):
* quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Quay 3.5.7 is now available with security update, bug fixes and various enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Quay 3.5.7 includes:\n\nSecurity Fix(es):\n\n* quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3665", "url": "https://access.redhat.com/errata/RHSA-2021:3665" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2000795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "category": "external", "summary": "PROJQUAY-2480", "url": "https://issues.redhat.com/browse/PROJQUAY-2480" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3665.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update", "tracking": { "current_release_date": "2024-11-13T23:32:23+00:00", "generator": { "date": "2024-11-13T23:32:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:3665", "initial_release_date": "2021-09-28T21:19:17+00:00", "revision_history": [ { "date": "2021-09-28T21:19:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-28T21:19:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T23:32:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "8Base-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el8" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product": { "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product_id": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-bundle\u0026tag=v3.5.7-7" } } }, { "category": "product_version", "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product": { "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product_id": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-rhel8\u0026tag=v3.5.7-11" } } }, { "category": "product_version", "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product": { "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product_id": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product_id": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product": { "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product_id": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d?arch=amd64\u0026repository_url=registry.redhat.io/quay/clair-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product": { "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product_id": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-bundle\u0026tag=v3.5.7-7" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product": { "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product_id": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product": { "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product_id": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-bundle\u0026tag=v3.5.7-6" } } }, { "category": "product_version", "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product": { "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product_id": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-rhel8\u0026tag=v3.5.7-6" } } }, { "category": "product_version", "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product": { "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product_id": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-rhel8\u0026tag=v3.5.7-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" }, "product_reference": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64" }, "product_reference": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64" }, "product_reference": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64" }, "product_reference": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64" }, "product_reference": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64" }, "product_reference": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64" }, "product_reference": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64" }, "product_reference": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64" }, "product_reference": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" }, "product_reference": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "relates_to_product_reference": "8Base-Quay-3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yanir Tsarimi" ], "organization": "Orca Security" } ], "cve": "CVE-2021-3762", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-09-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000795" } ], "notes": [ { "category": "description", "text": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write", "title": "Vulnerability summary" }, { "category": "other", "text": "Only a single version of Red Hat Quay, 3.5.6 is affected by this vulnerability. All previous released versions of Red Hat Quay are not affected by this vulnerability.\n\nThe overall vulnerability is rated as Critical for the ClairCore engine, but only rated Important for the Red Hat Quay product. In Red Hat Quay, Clair runs as the \u0027nobody\u0027 user in an unprivileged container, limiting the impact to modification of non-sensitives files in that container.\n\nRed Hat Advanced Cluster Security is not affected by this vulnerability.\n\nQuay.io is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ], "known_not_affected": [ "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3762" }, { "category": "external", "summary": "RHBZ#2000795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762" } ], "release_date": "2021-09-28T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-28T21:19:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3665" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write" } ] }
rhsa-2021:3665
Vulnerability from csaf_redhat
Published
2021-09-28 21:19
Modified
2025-10-09 21:59
Summary
Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update
Notes
Topic
Red Hat Quay 3.5.7 is now available with security update, bug fixes and various enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Quay 3.5.7 includes:
Security Fix(es):
* quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Quay 3.5.7 is now available with security update, bug fixes and various enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Quay 3.5.7 includes:\n\nSecurity Fix(es):\n\n* quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3665", "url": "https://access.redhat.com/errata/RHSA-2021:3665" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2000795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "category": "external", "summary": "PROJQUAY-2480", "url": "https://issues.redhat.com/browse/PROJQUAY-2480" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3665.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update", "tracking": { "current_release_date": "2025-10-09T21:59:15+00:00", "generator": { "date": "2025-10-09T21:59:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2021:3665", "initial_release_date": "2021-09-28T21:19:17+00:00", "revision_history": [ { "date": "2021-09-28T21:19:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-28T21:19:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T21:59:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "8Base-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el8" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product": { "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product_id": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-bundle\u0026tag=v3.5.7-7" } } }, { "category": "product_version", "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product": { "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product_id": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-rhel8\u0026tag=v3.5.7-11" } } }, { "category": "product_version", "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product": { "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product_id": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product_id": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product": { "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product_id": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d?arch=amd64\u0026repository_url=registry.redhat.io/quay/clair-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product": { "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product_id": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-bundle\u0026tag=v3.5.7-7" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product": { "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product_id": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product": { "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product_id": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-bundle\u0026tag=v3.5.7-6" } } }, { "category": "product_version", "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product": { "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product_id": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-rhel8\u0026tag=v3.5.7-6" } } }, { "category": "product_version", "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product": { "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product_id": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-rhel8\u0026tag=v3.5.7-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" }, "product_reference": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64" }, "product_reference": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64" }, "product_reference": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64" }, "product_reference": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64" }, "product_reference": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64" }, "product_reference": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64" }, "product_reference": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64" }, "product_reference": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64" }, "product_reference": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" }, "product_reference": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "relates_to_product_reference": "8Base-Quay-3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yanir Tsarimi" ], "organization": "Orca Security" } ], "cve": "CVE-2021-3762", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-09-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000795" } ], "notes": [ { "category": "description", "text": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write", "title": "Vulnerability summary" }, { "category": "other", "text": "Only a single version of Red Hat Quay, 3.5.6 is affected by this vulnerability. All previous released versions of Red Hat Quay are not affected by this vulnerability.\n\nThe overall vulnerability is rated as Critical for the ClairCore engine, but only rated Important for the Red Hat Quay product. In Red Hat Quay, Clair runs as the \u0027nobody\u0027 user in an unprivileged container, limiting the impact to modification of non-sensitives files in that container.\n\nRed Hat Advanced Cluster Security is not affected by this vulnerability.\n\nQuay.io is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ], "known_not_affected": [ "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3762" }, { "category": "external", "summary": "RHBZ#2000795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762" } ], "release_date": "2021-09-28T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-28T21:19:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3665" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write" } ] }
RHSA-2021:3665
Vulnerability from csaf_redhat
Published
2021-09-28 21:19
Modified
2025-10-09 21:59
Summary
Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update
Notes
Topic
Red Hat Quay 3.5.7 is now available with security update, bug fixes and various enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Quay 3.5.7 includes:
Security Fix(es):
* quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Quay 3.5.7 is now available with security update, bug fixes and various enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Quay 3.5.7 includes:\n\nSecurity Fix(es):\n\n* quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3665", "url": "https://access.redhat.com/errata/RHSA-2021:3665" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2000795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "category": "external", "summary": "PROJQUAY-2480", "url": "https://issues.redhat.com/browse/PROJQUAY-2480" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3665.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.5.7 bug fix and security update", "tracking": { "current_release_date": "2025-10-09T21:59:15+00:00", "generator": { "date": "2025-10-09T21:59:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2021:3665", "initial_release_date": "2021-09-28T21:19:17+00:00", "revision_history": [ { "date": "2021-09-28T21:19:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-28T21:19:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T21:59:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "8Base-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el8" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product": { "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product_id": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-bundle\u0026tag=v3.5.7-7" } } }, { "category": "product_version", "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product": { "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product_id": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-rhel8\u0026tag=v3.5.7-11" } } }, { "category": "product_version", "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product": { "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product_id": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product_id": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product": { "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product_id": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d?arch=amd64\u0026repository_url=registry.redhat.io/quay/clair-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product": { "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product_id": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-bundle\u0026tag=v3.5.7-7" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product": { "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product_id": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-rhel8\u0026tag=v3.5.7-8" } } }, { "category": "product_version", "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product": { "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product_id": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-bundle\u0026tag=v3.5.7-6" } } }, { "category": "product_version", "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product": { "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product_id": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-rhel8\u0026tag=v3.5.7-6" } } }, { "category": "product_version", "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product": { "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product_id": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-rhel8\u0026tag=v3.5.7-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" }, "product_reference": "quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64" }, "product_reference": "quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64" }, "product_reference": "quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64" }, "product_reference": "quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64" }, "product_reference": "quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64" }, "product_reference": "quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64" }, "product_reference": "quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64" }, "product_reference": "quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64" }, "product_reference": "quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" }, "product_reference": "quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64", "relates_to_product_reference": "8Base-Quay-3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yanir Tsarimi" ], "organization": "Orca Security" } ], "cve": "CVE-2021-3762", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-09-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000795" } ], "notes": [ { "category": "description", "text": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write", "title": "Vulnerability summary" }, { "category": "other", "text": "Only a single version of Red Hat Quay, 3.5.6 is affected by this vulnerability. All previous released versions of Red Hat Quay are not affected by this vulnerability.\n\nThe overall vulnerability is rated as Critical for the ClairCore engine, but only rated Important for the Red Hat Quay product. In Red Hat Quay, Clair runs as the \u0027nobody\u0027 user in an unprivileged container, limiting the impact to modification of non-sensitives files in that container.\n\nRed Hat Advanced Cluster Security is not affected by this vulnerability.\n\nQuay.io is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ], "known_not_affected": [ "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3762" }, { "category": "external", "summary": "RHBZ#2000795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762" } ], "release_date": "2021-09-28T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-28T21:19:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3665" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:bbfe6e82c9c01fb6f4d8c67e1af5a1e3e00486f902efc14a4e2fe22e5fcad65d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:6c2ab763239f6e5a2a72890120bf1f20f6277850cec59a7e11cea2b6a06f12e8_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:ccd53fb4b31b792175cfece28ae0b6a9956090eb273e82998444fc6c7f312e20_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:d0448bd89653695c1089dfcd12e2bcf4169ac732b1830c6c9cbb9909181778ed_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:76b5e1deb371d2514f2feb59b750ded7e1f76f48b35a532ad806f921f4a4e722_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:68e766235bdcd8f3335e2ab6e09942d98b183b3e498abb65acab6481664d46ed_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:1ebb1f1ec3e413984cab04bd605afa4e1ae17375bfb7fc835c1272320900b42b_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:722cf3c05eb5663a737cb1385b971b6d1f0c8b2595d5ac425f7b100c25e2fd26_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:bca072adf2d667291fbc11a466f8c3e07ba2ba50495038b54c75e2633986b839_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:dc4f2c32b41edf2ee79bb424ce0fbeaed7f53108e0c568b7e9808d8ce3ed36b3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write" } ] }
fkie_cve-2021-3762
Vulnerability from fkie_nvd
Published
2022-03-03 22:15
Modified
2024-11-21 06:22
Severity ?
Summary
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC3746AC-E2FF-414F-8707-CE382C70441B", "versionEndExcluding": "0.4.8", "versionStartIncluding": "0.4.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:clair:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A00809-457A-4305-94EF-7E523A8B1691", "versionEndExcluding": "0.5.5", "versionStartIncluding": "0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:quay:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "414D3D0A-77F7-4D92-88D6-647F293A86B4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad de salto de directorio en el motor ClairCore de Clair. Un atacante puede explotar esto al suministrar una imagen de contenedor dise\u00f1ada que, cuando es escaneada por Clair, permite una escritura de archivos arbitrarios en el sistema de archivos, permitiendo potencialmente una ejecuci\u00f3n de c\u00f3digo remota" } ], "id": "CVE-2021-3762", "lastModified": "2024-11-21T06:22:21.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-03T22:15:08.467", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/clair/pull/1379" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/clair/pull/1380" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/claircore/pull/478" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/clair/pull/1379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/clair/pull/1380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/quay/claircore/pull/478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-mq47-6wwv-v79w
Vulnerability from github
Published
2022-03-04 00:00
Modified
2022-03-18 23:23
Severity ?
VLAI Severity ?
Summary
Path traversal in claircore
Details
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/quay/claircore" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.4.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/quay/claircore" }, "ranges": [ { "events": [ { "introduced": "1.0.0" }, { "fixed": "1.1.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/quay/claircore" }, "ranges": [ { "events": [ { "introduced": "0.5.0" }, { "fixed": "0.5.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-3762" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2022-03-18T23:23:02Z", "nvd_published_at": "2022-03-03T22:15:00Z", "severity": "HIGH" }, "details": "A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.", "id": "GHSA-mq47-6wwv-v79w", "modified": "2022-03-18T23:23:02Z", "published": "2022-03-04T00:00:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3762" }, { "type": "WEB", "url": "https://github.com/quay/clair/pull/1379" }, { "type": "WEB", "url": "https://github.com/quay/clair/pull/1380" }, { "type": "WEB", "url": "https://github.com/quay/claircore/pull/478" }, { "type": "WEB", "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" }, { "type": "WEB", "url": "https://github.com/quay/claircore/commit/dff671c665141f126c072de8a744855d4916c9c7" }, { "type": "WEB", "url": "https://github.com/quay/claircore/commit/ed5f52aec1c82746725e9cc23e98316eab8be25a" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000795" }, { "type": "PACKAGE", "url": "https://github.com/quay/claircore" }, { "type": "WEB", "url": "https://github.com/quay/claircore/commits/v0.4.8" }, { "type": "WEB", "url": "https://github.com/quay/claircore/commits/v0.5.5" }, { "type": "WEB", "url": "https://github.com/quay/claircore/commits/v1.1.0" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2022-0346" }, { "type": "WEB", "url": "https://vulmon.com/exploitdetails?qidtp=maillist_oss_security\u0026qid=d19fce9ede06e13dfb5630ece7f14f83" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Path traversal in claircore" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…