Vulnerability Name: | CVE-2021-4024 (CCN-216057) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-11-24 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-11-24 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-03-01 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
4.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
4.2 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 CWE-346 CWE-200 CWE-346 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-4024 Source: CCN Type: Red Hat Bugzilla Bug 2026675 (CVE-2021-4024) - CVE-2021-4024 podman: podman machine spawns gvproxy with port bound to all IPs Source: MISC Type: Broken Link, Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2026675, Source: XF Type: UNKNOWN podman-cve20214024-info-disc(216057) Source: CCN Type: podman GIT Repository v3.4.3 Source: MISC Type: Release Notes, Third Party Advisory https://github.com/containers/podman/releases/tag/v3.4.3 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-6bd024d2a7 Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-4024 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |