Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5154: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
High
VulnerabilityCVE-2024-5154cvecve-2024-5154
Published: Wed Jun 12 2024 (06/12/2024, 08:51:43 UTC)
Source: CVE Database V5

Description

A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:15:24 UTC

Technical Analysis

CVE-2024-5154 is a path traversal vulnerability identified in the cri-o container runtime, specifically affecting versions 1.28.6, 1.29.4, and 1.30.0. The flaw arises because cri-o insufficiently restricts pathname resolution within containers, allowing a malicious container to create symbolic links that reference arbitrary files on the host filesystem via directory traversal sequences such as '../'. This bypasses the intended container isolation boundaries, enabling the container to read from and write to files outside its designated sandbox. The vulnerability requires that the attacker has high privileges within the container and involves user interaction to trigger the exploit. The CVSS v3.1 score is 8.1, reflecting high severity due to the potential for complete compromise of host confidentiality and integrity, although availability impact is not present. The scope is changed (container to host), amplifying the risk. No known exploits have been reported in the wild yet, but the vulnerability is critical given cri-o's role as a widely used container runtime in Kubernetes clusters, especially in enterprise and cloud environments. The flaw could allow attackers to manipulate host system files, potentially leading to privilege escalation, data exfiltration, or disruption of host operations.

Potential Impact

The impact of CVE-2024-5154 is significant for organizations using cri-o as their container runtime, particularly in Kubernetes environments. Successful exploitation allows malicious containers to break out of their isolation and access or modify arbitrary host files, compromising the confidentiality and integrity of the host system. This can lead to unauthorized data access, tampering with critical system files, and potential privilege escalation to the host OS level. Organizations running multi-tenant clusters or hosting sensitive workloads face increased risk of data breaches and operational disruption. The vulnerability undermines trust in container isolation, potentially affecting cloud service providers, managed Kubernetes platforms, and enterprises relying on container security. Although no active exploits are reported, the ease of exploitation (low attack complexity) and the high privileges required within the container mean that insider threats or compromised containers pose a serious risk. The absence of availability impact reduces the risk of denial-of-service but does not diminish the threat to data security and system integrity.

Mitigation Recommendations

To mitigate CVE-2024-5154, organizations should immediately upgrade cri-o to a patched version once available from the vendor or community. Until patches are released, restrict container privileges by enforcing the principle of least privilege, avoiding running containers with elevated capabilities or as root. Implement strict admission controls and security policies in Kubernetes to prevent untrusted or potentially malicious containers from running. Use security modules such as SELinux or AppArmor to enforce mandatory access controls that limit container access to host filesystems. Monitor container activity for suspicious symbolic link creation or unexpected file access patterns. Employ runtime security tools that detect container breakout attempts. Additionally, isolate sensitive workloads on dedicated nodes and limit host filesystem mounts inside containers. Regularly audit container runtime configurations and update to the latest secure versions. Finally, educate DevOps and security teams about this vulnerability to ensure rapid response and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-05-20T20:46:53.974Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3739f5a9374a9d11009

Added to database: 11/20/2025, 7:29:55 AM

Last enriched: 2/26/2026, 3:15:24 PM

Last updated: 3/23/2026, 6:44:01 PM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses