Cri-O: Arbitrary /etc/passwd Injection via Crafted ENV Variable
CVE-2022-4318 Published on September 25, 2023

Cri-o: /etc/passwd tampering privesc
A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.

Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2022-4318 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Timeline

Reported to Red Hat.

Made public.

Weakness Type

Insertion of Sensitive Information into Externally-Accessible File or Directory

The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.


Products Associated with CVE-2022-4318

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-4318 are published in these products:

 
 
 

Affected Versions

Red Hat OpenShift Container Platform 4.11: Red Hat OpenShift Container Platform 4.12: Red Hat Enterprise Linux 9:

Exploit Probability

EPSS
0.04%
Percentile
12.48%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.