6.4 CVE-2025-8766

Enriched by CISA
 

A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container
https://nvd.nist.gov/vuln/detail/CVE-2025-8766

Categories

CWE-276 : Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files. The architecture needs to access and modification attributes for files to only those users who actually require those actions. Executables installed world-writable. Home directories installed world-readable. World-writable log files allow information loss; world-readable file has cleartext passwords. World-readable directory. Windows product uses insecure permissions when installing on Solaris (genesis: port error). Insecure permissions for a shared secret key file. Overlaps cryptographic problem. Default permissions of a device allow IP spoofing.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Red Hat Red Hat Openshift Data Foundation 4
    © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

    CPE

    cpe start end


    REMEDIATION




    EXPLOITS


    Exploit-db.com

    id description date
    No known exploits

    POC Github

    Url
    No known exploits

    Other Nist (github, ...)

    Url
    No known exploits


    CAPEC


    Common Attack Pattern Enumerations and Classifications

    id description severity
    1 Accessing Functionality Not Properly Constrained by ACLs
    High
    127 Directory Indexing
    Medium
    81 Web Server Logs Tampering
    High


    MITRE


    Techniques

    id description
    T1083 File and Directory Discovery
    T1574.010 Hijack Execution Flow: ServicesFile Permissions Weakness
    © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

    Mitigations

    id description
    M1018 Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able.
    © 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.