{"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-16T04:34:22.010Z"},"title":"Podman/Varlink API Privilege Escalation","problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Privilege Escalation"}]}],"affected":[{"vendor":"n/a","product":"Podman","versions":[{"version":"1.5.1","status":"affected"}],"modules":["API"]},{"vendor":"n/a","product":"Varlink","versions":[{"version":"1.5.1","status":"affected"}],"modules":["API"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in Podman and Varlink 1.5.1 gefunden. Betroffen hiervon ist ein unbekannter Ablauf der Komponente API. Durch die Manipulation mit unbekannten Daten kann eine Remote Privilege Escalation-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6,"vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2019-10-15T02:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2019-10-15T02:00:00.000Z","lang":"en","value":"Exploit disclosed"},{"time":"2019-10-15T02:00:00.000Z","lang":"en","value":"EDB entry disclosed"},{"time":"2019-10-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-06-04T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-02-16T05:39:03.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Jeremy Brown","type":"finder"},{"lang":"en","value":"misc (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.143949","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.143949","tags":["signature","permissions-required"]},{"url":"https://www.exploit-db.com/exploits/47500","tags":["exploit"]},{"url":"https://github.com/containers/podman/issues/21628","tags":["issue-tracking"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:00:19.039Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.143949","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.143949","tags":["signature","permissions-required","x_transferred"]},{"url":"https://www.exploit-db.com/exploits/47500","tags":["exploit","x_transferred"]},{"url":"https://github.com/containers/podman/issues/21628","tags":["issue-tracking","x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2019-25067","datePublished":"2022-06-09T13:10:29.000Z","dateReserved":"2022-06-04T00:00:00.000Z","dateUpdated":"2024-08-05T03:00:19.039Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}