支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2026-23953 基础信息
漏洞信息
                                        # Incus 环境配置换行注入漏洞

N/A
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Incus container environment configuration newline injection
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable containing newlines, which can be used to add additional configuration items in the container’s lxc.conf due to newline injection. This can allow adding arbitrary lifecycle hooks, ultimately resulting in arbitrary command execution on the host. Exploiting this issue on IncusOS requires a slight modification of the payload to change to a different writable directory for the validation step (e.g /tmp). This can be confirmed with a second container with /tmp mounted from the host (A privileged action for validation only). A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
来源:美国国家漏洞数据库 NVD
漏洞类别
对CRLF序列的转义处理不恰当(CRLF注入)
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2026-23953 的公开POC
#POC 描述源链接神龙链接
三、漏洞 CVE-2026-23953 的情报信息
四、漏洞 CVE-2026-23953 的评论

暂无评论


发表评论