一、 漏洞 CVE-2023-25173 基础信息
漏洞标题
容器额外组没有正确设置
来源:AIGC 神龙大模型
漏洞描述信息
容器d的补充组未正确设置
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
containerd supplementary groups are not set up properly
来源:美国国家漏洞数据库 NVD
漏洞描述信息
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
授权机制不正确
来源:美国国家漏洞数据库 NVD
漏洞标题
containerd 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
containerd是containerd开源的一个行业标准的容器运行时。 containerd 1.6.18之前的1.6.x版本和1.5.18之前的1.5.x版本存在安全漏洞,该漏洞源于补充组在容器内没有被正确设置,攻击者利用该漏洞可能会获得对敏感信息的访问权限或获得在该容器中执行代码的能力。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-25173 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2023-25173 的情报信息