Vulnerability Name:

CVE-2021-20206 (CCN-198968)

Assigned:2020-12-17
Published:2021-02-08
Updated:2022-08-05
Summary:An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVSS v3 Severity:7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-22
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2021-20206

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1919391

Source: XF
Type: UNKNOWN
cni-cve202120206-dir-traversal(198968)

Source: CCN
Type: cni GIT Repository
tighten up plugin-finding logic #808

Source: CCN
Type: SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE
Directory Traversal

Source: MISC
Type: Third Party Advisory
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549

Source: CCN
Type: IBM Security Bulletin 6599703 (Db2 On Openshift)
Multiple vulnerabilities affect IBM Db2 On Openshift and IBM Db2 and Db2 Warehouse on Cloud Pak for Data

Source: CCN
Type: IBM Security Bulletin 6999559 (Edge Application Manager)
IBM Edge Application Manager 4.5 addresses multiple security vulnerabilities

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2021-20206

Vulnerable Configuration:Configuration 1:
  • cpe:/a:linuxfoundation:container_network_interface:*:*:*:*:*:*:*:* (Version < 0.8.1)

  • Configuration CCN 1:
  • cpe:/a:ibm:db2_warehouse:3.5:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_warehouse:4.0:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:3.5:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:4.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7848
    P
    cni-plugins-1.1.1-150500.1.19 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7862
    P
    podman-4.4.4-150500.1.4 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7846
    P
    buildah-1.29.1-150500.1.13 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7847
    P
    cni-1.1.2-150500.1.20 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:51990
    P
    Security update for podman (Important)
    2023-01-27
    oval:org.opensuse.security:def:51973
    P
    Security update for cni (Important)
    2022-12-20
    oval:org.opensuse.security:def:51974
    P
    Security update for cni-plugins (Important)
    2022-12-20
    oval:org.opensuse.security:def:51560
    P
    Security update for cni (Important) (in QA)
    2022-11-18
    oval:org.opensuse.security:def:51561
    P
    Security update for cni-plugins (Important) (in QA)
    2022-11-18
    oval:org.opensuse.security:def:601
    P
    Security update for buildah (Important) (in QA)
    2022-09-21
    oval:org.opensuse.security:def:3240
    P
    libpulse-mainloop-glib0-32bit-5.0-4.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94870
    P
    buildah-1.23.1-150400.1.17 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:101691
    P
    Security update for buildah (Moderate)
    2022-03-09
    oval:org.opensuse.security:def:1000
    P
    Security update for buildah (Moderate)
    2022-03-09
    oval:org.opensuse.security:def:112031
    P
    buildah-1.23.0-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105587
    P
    buildah-1.23.0-1.1 on GA media (Moderate)
    2021-10-01
    BACK
    linuxfoundation container network interface *
    ibm db2 warehouse 3.5 -
    ibm db2 warehouse 4.0 -
    ibm db2 3.5 -
    ibm db2 4.0 -