`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-02-15 05:15
Updated : 2024-11-21 17:15
NVD link : CVE-2024-25940
Mitre link : CVE-2024-25940
CVE.ORG link : CVE-2024-25940
JSON object : View
Products Affected
No product.
CWE
CWE-922
Insecure Storage of Sensitive Information