{"containers":{"cna":{"affected":[{"product":"quay/claircore","vendor":"n/a","versions":[{"status":"affected","version":"Affects v0.4.6 and higher, v0.5.3 and higher | Fixedin claircore v0.4.8, v0.5.5."}]}],"descriptions":[{"lang":"en","value":"A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-03T21:41:19.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000795"},{"tags":["x_refsource_MISC"],"url":"https://github.com/quay/claircore/pull/478"},{"tags":["x_refsource_MISC"],"url":"https://github.com/quay/clair/pull/1379"},{"tags":["x_refsource_MISC"],"url":"https://github.com/quay/clair/pull/1380"},{"tags":["x_refsource_MISC"],"url":"https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821"},{"tags":["x_refsource_MISC"],"url":"https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2021-3762","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"quay/claircore","version":{"version_data":[{"version_value":"Affects v0.4.6 and higher, v0.5.3 and higher | Fixedin claircore v0.4.8, v0.5.5."}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=2000795","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000795"},{"name":"https://github.com/quay/claircore/pull/478","refsource":"MISC","url":"https://github.com/quay/claircore/pull/478"},{"name":"https://github.com/quay/clair/pull/1379","refsource":"MISC","url":"https://github.com/quay/clair/pull/1379"},{"name":"https://github.com/quay/clair/pull/1380","refsource":"MISC","url":"https://github.com/quay/clair/pull/1380"},{"name":"https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821","refsource":"MISC","url":"https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821"},{"name":"https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83","refsource":"MISC","url":"https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:09:08.890Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000795"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/quay/claircore/pull/478"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/quay/clair/pull/1379"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/quay/clair/pull/1380"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2021-3762","datePublished":"2022-03-03T21:41:19.000Z","dateReserved":"2021-09-03T00:00:00.000Z","dateUpdated":"2024-08-03T17:09:08.890Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}