Path traversal in claircore
High severity
GitHub Reviewed
Published
Mar 4, 2022
to the GitHub Advisory Database
•
Updated Feb 6, 2023
Package
Affected versions
< 0.4.8
>= 1.0.0, < 1.1.0
>= 0.5.0, < 0.5.5
Patched versions
0.4.8
1.1.0
0.5.5
Description
Published by the National Vulnerability Database
Mar 3, 2022
Published to the GitHub Advisory Database
Mar 4, 2022
Reviewed
Mar 18, 2022
Last updated
Feb 6, 2023
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
References