Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-94jh-j374-9r3j] Refining Attack Requirement to Reflect Dependency on Physical Host for Successful Exploitation #5157

Open
wants to merge 1 commit into
base: anonymous-nlp-student/advisory-improvement-5157
Choose a base branch
from

Conversation

anonymous-nlp-student
Copy link

I am collaborating with @vulnerability-analyst to enhance the accuracy of the OSS vulnerability advisories.

In alignment with the feedback from @shelbyc in this PR, the Attack Requirement (AT) should be updated to P (Present) rather than the erroneous N (None). This is because if the attacker submits a job to the container, he/she will not gain the root privileges.

If the YARN cluster is accepting work from remote (authenticated) users, and these users' submitted job are executed in the physical host, rather than a container, then the CVE permits remote users to gain root privileges.

The sentence underlined above represents the “specific deployment and execution conditions” required for a successful attack, as defined in the CVSS 4 specification:

The successful attack depends on the presence of specific deployment and execution conditions of the vulnerable system that enable the attack.

Overall, this vulnerability describes the following scenario:

  • The vulnerability allows a local attacker to create a malicious libcrypto.so library and place it in a writable directory within the modified search path $ORIGIN/:../lib/native/. When the container-executor binary (which requires root privileges) is invoked, it may load the attacker’s malicious library instead of the legitimate libcrypto.so.
  • For a remote attacker, successful exploitation is possible only if the YARN cluster executes user-submitted jobs directly on the physical host rather than within a container. If the attacker has access only to a containerized environment, the attack will fail.

@github-actions github-actions bot changed the base branch from main to anonymous-nlp-student/advisory-improvement-5157 January 10, 2025 04:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant