Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1753: Improper Link Resolution Before File Access ('Link Following')

0
High
VulnerabilityCVE-2024-1753cvecve-2024-1753
Published: Mon Mar 18 2024 (03/18/2024, 14:23:44 UTC)
Source: CVE Database V5

Description

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:10:58 UTC

Technical Analysis

CVE-2024-1753 is a vulnerability discovered in Buildah version 4.15.0 and subsequently impacting Podman Build, container build tools widely used in Linux environments for creating OCI-compliant container images. The flaw arises from improper link resolution before file access during the container image build process. Specifically, a maliciously crafted Containerfile can specify a dummy image containing a symbolic link that points to the host's root filesystem as a mount source. When the build process executes the RUN step, this symbolic link causes the host root filesystem to be mounted inside the container build environment with read-write permissions. This effectively breaks container isolation, allowing commands executed during the RUN step to access and modify the host filesystem directly. The vulnerability does not require privileged user rights (PR:N) but does require user interaction (UI:R) to initiate the build process. The CVSS 3.1 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, as the attacker can fully escape the container and control the host system. No known public exploits have been reported yet, but the potential for severe damage is significant given the widespread use of Buildah and Podman in development and production environments. The vulnerability is classified under improper link resolution or 'link following' issues, which are common in container escape scenarios. Mitigation typically involves patching the affected software and restricting untrusted Containerfile usage.

Potential Impact

The impact of CVE-2024-1753 is severe for organizations relying on Buildah and Podman for container image builds. Successful exploitation leads to full container escape at build time, granting attackers read-write access to the host filesystem. This compromises the confidentiality of sensitive host data, the integrity of system files and applications, and the availability of the host system by enabling arbitrary code execution and potential system disruption. Attackers could implant persistent backdoors, exfiltrate data, or disrupt critical services. Since containerization is a cornerstone of modern DevOps and cloud-native infrastructure, this vulnerability threatens the security of CI/CD pipelines, developer workstations, and production build environments globally. Organizations using untrusted or third-party Containerfiles are particularly vulnerable. The lack of privilege requirement lowers the barrier to exploitation, increasing risk. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a high-priority threat to containerized environments.

Mitigation Recommendations

To mitigate CVE-2024-1753, organizations should immediately upgrade Buildah and Podman to versions where this vulnerability is patched once available. Until patches are released, restrict the use of untrusted or third-party Containerfiles in build pipelines to prevent malicious symbolic link exploitation. Implement strict access controls and code review policies for Containerfiles used in automated builds. Employ container build sandboxing techniques that isolate build environments from the host filesystem more robustly. Monitor build logs and filesystem mounts for suspicious activity indicative of symbolic link abuse. Consider using alternative container build tools that do not exhibit this vulnerability if patching is delayed. Additionally, enforce least privilege principles for build users and automate vulnerability scanning of container build configurations. Regularly audit container build environments and hosts for unauthorized filesystem changes. Finally, educate developers and DevOps teams about the risks of symbolic link attacks in container builds to improve detection and prevention.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-02-22T14:42:20.623Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3729f5a9374a9d10f1e

Added to database: 11/20/2025, 7:29:54 AM

Last enriched: 3/7/2026, 9:10:58 PM

Last updated: 3/23/2026, 7:27:50 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses