containernetworking/cni improper limitation of path name

Overview

Source
ID
GHSA-xjqr-g762-pxwp
Aliases
CVE-2021-20206
GO-2022-0230

Description

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. ### Specific Go Packages Affected github.com/containernetworking/cni/pkg/invoke

Summary

651
Total packages affected
Packages with at least one version that is affected by the advisory or has an affected dependency.
247
Packages with a known fix
Packages with versions affected by the advisory that have a greater version that is not affected.
0.05%
Total ecosystem affected
The proportion of packages in the ecosystem that are affected by the advisory (fixed or not).
Affected Version: Introduced: 0, Fixed: 0.8.1
Patched/Unaffected
v0.8.1
v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.3.0
Affected
v0.8.0
v0.7.1
v0.7.0
v0.6.0
v0.5.2
v0.5.1
v0.5.0
v0.4.0
v0.3.0
v0.2.3
v0.2.2
v0.2.1
v0.2.0
v0.1.0