by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
9 packages
- podman-tui
- podman-bootc
- cockpit-podman
- podman-compose
- podman-desktop
- nomad-driver-podman
- python312Packages.podman
- python313Packages.podman
- python314Packages.podman
- @LeSuisse dismissed
PowerShell Command Injection in Podman HyperV Machine
Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.
References
Affected products
- ==>= 4.8.0, < 5.8.2
Matching in nixpkgs
Ignored packages (9)
pkgs.podman-tui
Podman Terminal UI
pkgs.podman-bootc
Streamlining podman+bootc interactions
pkgs.cockpit-podman
Cockpit UI for podman containers
pkgs.podman-compose
Implementation of docker-compose with podman backend
pkgs.podman-desktop
Graphical tool for developing on containers and Kubernetes
pkgs.nomad-driver-podman
Podman task driver for Nomad
pkgs.python312Packages.podman
Python bindings for Podman's RESTful API
pkgs.python313Packages.podman
Python bindings for Podman's RESTful API
pkgs.python314Packages.podman
Python bindings for Podman's RESTful API
Package maintainers
-
@vdemeester Vincent Demeester <vincent@sbr.pm>
-
@saschagrunert Sascha Grunert <mail@saschagrunert.de>