CVE-2025-9566 (CNNVD-202509-720)

HIGH
中文标题:
Podman 路径遍历漏洞
英文标题:
Podman: podman kube play command may overwrite host files
CVSS分数: 8.1
发布时间: 2025-09-05 19:54:30
漏洞类型: 路径遍历
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v6
漏洞描述
中文描述:

Podman是Podman开源的一款用于在Linux系统上开发、管理和运行OCI容器的引擎。 Podman存在路径遍历漏洞,该漏洞源于kube play命令可能被用于覆盖主机文件,可能导致文件被覆盖。

英文描述:

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CWE类型:
CWE-22
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Red Hat Red Hat Enterprise Linux 10 - - - cpe:/o:redhat:enterprise_linux:10.0
Red Hat Red Hat Enterprise Linux 8 8 - - cpe:/a:redhat:enterprise_linux:8::appstream
Red Hat Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8.6 - - cpe:/a:redhat:rhel_tus:8.6::appstream
Red Hat Red Hat Enterprise Linux 8.6 Telecommunications Update Service 8.6 - - cpe:/a:redhat:rhel_tus:8.6::appstream
Red Hat Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8.6 - - cpe:/a:redhat:rhel_tus:8.6::appstream
Red Hat Red Hat Enterprise Linux 8.8 Telecommunications Update Service 8.8 - - cpe:/a:redhat:rhel_e4s:8.8::appstream
Red Hat Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions 8.8 - - cpe:/a:redhat:rhel_e4s:8.8::appstream
Red Hat Red Hat Enterprise Linux 9 9 - - cpe:/a:redhat:enterprise_linux:9::appstream
Red Hat Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions 9.0 - - cpe:/a:redhat:rhel_e4s:9.0::appstream
Red Hat Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions 9.2 - - cpe:/a:redhat:rhel_e4s:9.2::appstream
Red Hat Red Hat Enterprise Linux 9.4 Extended Update Support 9.4 - - cpe:/a:redhat:rhel_eus:9.4::appstream
Red Hat Red Hat OpenShift Container Platform 4.13 4.13 - - cpe:/a:redhat:openshift:4.13::el9
Red Hat Red Hat OpenShift Container Platform 4.14 4.14 - - cpe:/a:redhat:openshift:4.14::el9
Red Hat Red Hat OpenShift Container Platform 4.17 4.17 - - cpe:/a:redhat:openshift:4.17::el9
Red Hat Red Hat OpenShift Container Platform 4.18 4.18 - - cpe:/a:redhat:openshift:4.18::el9
Red Hat Red Hat OpenShift Container Platform 4.19 4.19 - - cpe:/a:redhat:openshift:4.19::el9
Red Hat Red Hat OpenShift Container Platform 4.20 4.20 - - cpe:/a:redhat:openshift:4.20::el9
Red Hat Red Hat OpenShift Dev Spaces (RHOSDS) 3.24 3.24 - - cpe:/a:redhat:openshift_devspaces:3.24::el9
Red Hat Red Hat OpenShift Container Platform 4 - - - cpe:/a:redhat:openshift:4
Red Hat Red Hat OpenShift Dev Spaces 3 - - cpe:/a:redhat:openshift_devspaces:3:
Red Hat Red Hat OpenShift Container Platform 4.12 4.12 - - cpe:/a:redhat:openshift:4.12::el8
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2025:15900 vendor-advisory
cve.org
访问
RHSA-2025:15901 vendor-advisory
cve.org
访问
RHSA-2025:15904 vendor-advisory
cve.org
访问
RHSA-2025:16480 vendor-advisory
cve.org
访问
RHSA-2025:16481 vendor-advisory
cve.org
访问
RHSA-2025:16482 vendor-advisory
cve.org
访问
RHSA-2025:16488 vendor-advisory
cve.org
访问
RHSA-2025:16515 vendor-advisory
cve.org
访问
RHSA-2025:18217 vendor-advisory
cve.org
访问
RHSA-2025:18218 vendor-advisory
cve.org
访问
RHSA-2025:18240 vendor-advisory
cve.org
访问
RHSA-2025:19002 vendor-advisory
cve.org
访问
RHSA-2025:19041 vendor-advisory
cve.org
访问
RHSA-2025:19046 vendor-advisory
cve.org
访问
RHSA-2025:19094 vendor-advisory
cve.org
访问
RHSA-2025:20909 vendor-advisory
cve.org
访问
无标题 vdb-entry
cve.org
访问
RHBZ#2393152 issue-tracking
cve.org
访问
RHSA-2025:19894 vendor-advisory
cve.org
访问
RHSA-2025:20983 vendor-advisory
cve.org
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
secalert@redhat.com OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
机密性
NONE
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-09-05 19:54:30
修改时间:
2025-11-11 13:59:08
创建时间:
2025-11-11 15:40:54
更新时间:
2026-02-17 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-9566 2025-11-11 15:23:38 2025-11-11 07:40:54
NVD nvd_CVE-2025-9566 2025-11-11 15:01:01 2025-11-11 07:48:40
CNNVD cnnvd_CNNVD-202509-720 2025-11-11 15:12:56 2025-11-11 08:00:15
版本与语言
当前版本: v6
主要语言: EN
支持语言:
ZH EN
安全公告
暂无安全公告信息
变更历史
v6 NVD
2026-02-17 06:00:02
references_count: 22 → 27
查看详细变更
  • references_count: 22 -> 27
v5 NVD
2026-02-10 06:00:06
references_count: 20 → 22
查看详细变更
  • references_count: 20 -> 22
v4 CVE
2026-01-12 02:12:35
affected_products_count: 20 → 21; references_count: 18 → 20
查看详细变更
  • affected_products_count: 20 -> 21
  • references_count: 18 -> 20
v3 CNNVD
2025-11-11 16:00:15
vulnerability_type: 未提取 → 路径遍历; cnnvd_id: 未提取 → CNNVD-202509-720; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 路径遍历
  • cnnvd_id: 未提取 -> CNNVD-202509-720
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:40
affected_products_count: 23 → 20; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 23 -> 20
  • data_sources: ['cve'] -> ['cve', 'nvd']