漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
PowerShell Command Injection in Podman HyperV Machine
Vulnerability Description
Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Podman 操作系统命令注入漏洞
Vulnerability Description
Podman是Podman开源的一款用于在Linux系统上开发、管理和运行OCI容器的引擎。 Podman 4.8.0至5.8.1版本存在操作系统命令注入漏洞,该漏洞源于HyperV机器后端存在命令注入问题,可能导致控制VM镜像路径的攻击者执行任意PowerShell命令并提升权限。
CVSS Information
N/A
Vulnerability Type
N/A