Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9675: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
High
VulnerabilityCVE-2024-9675cvecve-2024-9675
Published: Wed Oct 09 2024 (10/09/2024, 14:32:11 UTC)
Source: CVE

Description

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

AI-Powered Analysis

AILast updated: 11/20/2025, 06:51:53 UTC

Technical Analysis

CVE-2024-9675 is a path traversal vulnerability identified in Buildah, a widely used container image building tool. The issue arises from improper validation of user-supplied paths for cache mounts during the execution of RUN instructions in container build files. Specifically, Buildah fails to ensure that cache mount paths are confined within its designated cache directory. This flaw enables a user with limited privileges to mount arbitrary directories from the host filesystem into the container with read/write access, provided the user running Buildah has access to those files. The vulnerability can be exploited locally by an attacker with some level of privilege (PR:L) without requiring user interaction (UI:N). The impact is severe, as it compromises confidentiality, integrity, and availability (C:H/I:H/A:H) of the host system by potentially exposing sensitive files or allowing modification of critical data. The CVSS 3.1 score of 7.8 reflects these risks. While no public exploits are currently known, the nature of the vulnerability makes it a significant concern for environments relying on Buildah for container image creation, especially where untrusted users have build access. The vulnerability was published on October 9, 2024, and is tracked under CVE-2024-9675. Mitigation requires careful validation of cache mount paths, restricting user privileges, and monitoring container build activities.

Potential Impact

For European organizations, the impact of CVE-2024-9675 is substantial, particularly for those leveraging containerization technologies in development, testing, and production environments. Unauthorized mounting of arbitrary host directories into containers can lead to exposure of sensitive data, including credentials, configuration files, and proprietary code. It also opens avenues for tampering with host files, potentially disrupting operations or enabling further lateral movement within networks. Critical sectors such as finance, healthcare, telecommunications, and government agencies that increasingly adopt containerized workflows are at heightened risk. The vulnerability could undermine compliance with data protection regulations like GDPR due to potential data breaches. Additionally, organizations using Buildah in CI/CD pipelines may face supply chain risks if attackers manipulate build environments. The requirement for local privilege limits remote exploitation but does not eliminate insider threats or risks from compromised developer workstations.

Mitigation Recommendations

To mitigate CVE-2024-9675, European organizations should: 1) Immediately update Buildah to a patched version once available from trusted sources. 2) Restrict Buildah usage to trusted users only, minimizing the number of users with build privileges. 3) Implement strict access controls on host directories to limit what users running Buildah can access. 4) Manually validate and sanitize cache mount paths in container build files to ensure they remain within intended cache directories. 5) Monitor container build logs and system audit logs for unusual mount activities or access patterns. 6) Employ container security tools that can detect unauthorized mounts or privilege escalations during builds. 7) Isolate build environments using dedicated build servers or virtual machines to contain potential exploitation. 8) Educate developers and DevOps teams about the risks of mounting arbitrary host paths and enforce secure build practices. 9) Integrate security scanning in CI/CD pipelines to detect misconfigurations related to cache mounts. 10) Consider alternative container build tools if immediate patching is not feasible, while maintaining security controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-09T02:47:50.357Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d513c4d7c5ea9f4b41bd9

Added to database: 5/21/2025, 4:06:20 AM

Last enriched: 11/20/2025, 6:51:53 AM

Last updated: 12/4/2025, 10:15:11 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats