CVE-2021-4024
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2021-4024. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
Available Exploits
Related News
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
GHSA-3cf2-x423-x582Advisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
References
Advisory provided by GitHub Security Advisory Database. Published: January 6, 2022, Modified: February 9, 2022