cadvisor-fips
0.49.1-r5
7.2
CVSS V3
CRI-O vulnerable to an arbitrary systemd property injection
On CRI-O, it looks like an arbitrary systemd property can be injected via a Pod annotation:
This means that any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
Tested with CRI-O v1.24 on minikube. I didn't test the latest v1.29 because it is incompatible with minikube: https://github.com/kubernetes/minikube/pull/18367
Thanks to Cédric Clerget (GitHub ID @cclerget) for finding out that CRI-O just passes pod annotations to OCI annotations: https://github.com/opencontainers/runc/pull/3923#discussion_r1532292536
CRI-O has to filter out annotations that have the prefix "org.systemd.property."
See also:
Unfortunately, the only workarounds would involve an external mutating webhook to disallow these annotations