CVE-2025-9566 (CNNVD-202509-720)
HIGH
中文标题:
Podman 路径遍历漏洞
英文标题:
Podman: podman kube play command may overwrite host files
CVSS分数:
8.1
发布时间:
2025-09-05 19:54:30
漏洞类型:
路径遍历
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v6
漏洞描述
中文描述:
Podman是Podman开源的一款用于在Linux系统上开发、管理和运行OCI容器的引擎。 Podman存在路径遍历漏洞,该漏洞源于kube play命令可能被用于覆盖主机文件,可能导致文件被覆盖。
英文描述:
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1
CWE类型:
CWE-22
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 | - | - | - |
cpe:/o:redhat:enterprise_linux:10.0
|
| Red Hat | Red Hat Enterprise Linux 8 | 8 | - | - |
cpe:/a:redhat:enterprise_linux:8::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | 8.6 | - | - |
cpe:/a:redhat:rhel_tus:8.6::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.6 Telecommunications Update Service | 8.6 | - | - |
cpe:/a:redhat:rhel_tus:8.6::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | 8.6 | - | - |
cpe:/a:redhat:rhel_tus:8.6::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.8 Telecommunications Update Service | 8.8 | - | - |
cpe:/a:redhat:rhel_e4s:8.8::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | 8.8 | - | - |
cpe:/a:redhat:rhel_e4s:8.8::appstream
|
| Red Hat | Red Hat Enterprise Linux 9 | 9 | - | - |
cpe:/a:redhat:enterprise_linux:9::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | 9.0 | - | - |
cpe:/a:redhat:rhel_e4s:9.0::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | 9.2 | - | - |
cpe:/a:redhat:rhel_e4s:9.2::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | 9.4 | - | - |
cpe:/a:redhat:rhel_eus:9.4::appstream
|
| Red Hat | Red Hat OpenShift Container Platform 4.13 | 4.13 | - | - |
cpe:/a:redhat:openshift:4.13::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.14 | 4.14 | - | - |
cpe:/a:redhat:openshift:4.14::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.17 | 4.17 | - | - |
cpe:/a:redhat:openshift:4.17::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.18 | 4.18 | - | - |
cpe:/a:redhat:openshift:4.18::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.19 | 4.19 | - | - |
cpe:/a:redhat:openshift:4.19::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.20 | 4.20 | - | - |
cpe:/a:redhat:openshift:4.20::el9
|
| Red Hat | Red Hat OpenShift Dev Spaces (RHOSDS) 3.24 | 3.24 | - | - |
cpe:/a:redhat:openshift_devspaces:3.24::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4 | - | - | - |
cpe:/a:redhat:openshift:4
|
| Red Hat | Red Hat OpenShift Dev Spaces | 3 | - | - |
cpe:/a:redhat:openshift_devspaces:3:
|
| Red Hat | Red Hat OpenShift Container Platform 4.12 | 4.12 | - | - |
cpe:/a:redhat:openshift:4.12::el8
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2025:15900
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15901
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15904
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:16480
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:16481
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:16482
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:16488
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:16515
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:18217
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:18218
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:18240
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19002
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19041
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19046
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19094
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:20909
vendor-advisory
cve.org
访问
cve.org
无标题
vdb-entry
cve.org
访问
cve.org
RHBZ#2393152
issue-tracking
cve.org
访问
cve.org
RHSA-2025:19894
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:20983
vendor-advisory
cve.org
访问
cve.org
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
secalert@redhat.com
OTHER
nvd.nist.gov
访问
nvd.nist.gov
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
机密性
NONE
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-09-05 19:54:30
修改时间:
2025-11-11 13:59:08
创建时间:
2025-11-11 15:40:54
更新时间:
2026-02-17 06:00:02
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-9566 |
2025-11-11 15:23:38 | 2025-11-11 07:40:54 |
| NVD | nvd_CVE-2025-9566 |
2025-11-11 15:01:01 | 2025-11-11 07:48:40 |
| CNNVD | cnnvd_CNNVD-202509-720 |
2025-11-11 15:12:56 | 2025-11-11 08:00:15 |
版本与语言
当前版本:
v6
主要语言:
EN
支持语言:
ZH
EN
安全公告
暂无安全公告信息
变更历史
v6
NVD
2026-02-17 06:00:02
references_count: 22 → 27
查看详细变更
- references_count: 22 -> 27
v5
NVD
2026-02-10 06:00:06
references_count: 20 → 22
查看详细变更
- references_count: 20 -> 22
v4
CVE
2026-01-12 02:12:35
affected_products_count: 20 → 21; references_count: 18 → 20
查看详细变更
- affected_products_count: 20 -> 21
- references_count: 18 -> 20
v3
CNNVD
2025-11-11 16:00:15
vulnerability_type: 未提取 → 路径遍历; cnnvd_id: 未提取 → CNNVD-202509-720; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-202509-720
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:48:40
affected_products_count: 23 → 20; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 23 -> 20
- data_sources: ['cve'] -> ['cve', 'nvd']