CVE-2025-57852 (CNNVD-202509-4466)
中文标题:
Kaseya KServer 安全漏洞
英文标题:
Openshift-ai: privilege escalation via excessive /etc/passwd permissions
漏洞描述
中文描述:
Kaseya KServer是美国Kaseya公司的一个管理系统的中心服务器节点。 Kaseya KServer存在安全漏洞,该漏洞源于容器镜像构建时创建了组可写权限的/etc/passwd文件,可能导致权限提升。
英文描述:
A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Red Hat | Red Hat OpenShift AI 2.16 | 2.16 | - | - |
cpe:/a:redhat:openshift_ai:2.16::el8
|
| Red Hat | Red Hat OpenShift AI 2.19 | 2.19 | - | - |
cpe:/a:redhat:openshift_ai:2.19::el8
|
| Red Hat | Red Hat OpenShift AI 2.21 | 2.21 | - | - |
cpe:/a:redhat:openshift_ai:2.21::el9
|
| Red Hat | Red Hat OpenShift AI 2.22 | 2.22 | - | - |
cpe:/a:redhat:openshift_ai:2.22::el9
|
| Red Hat | Red Hat OpenShift AI 2.24 | 2.24 | - | - |
cpe:/a:redhat:openshift_ai:2.24::el9
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-57852 |
2025-11-11 15:23:30 | 2025-11-11 07:40:45 |
| NVD | nvd_CVE-2025-57852 |
2025-11-11 15:01:04 | 2025-11-11 07:48:32 |
| CNNVD | cnnvd_CNNVD-202509-4466 |
2025-11-11 15:12:59 | 2025-11-11 08:00:14 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202509-4466
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']