{"id":"CVE-2021-20206","details":"An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","aliases":["GHSA-xjqr-g762-pxwp","GO-2022-0230"],"modified":"2026-04-10T04:29:22.800919Z","published":"2021-03-26T22:15:12.617Z","related":["MGASA-2023-0213","SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549","SUSE-SU-2022:0770-1","SUSE-SU-2022:3480-1","SUSE-SU-2022:3655-1","SUSE-SU-2022:3766-1","SUSE-SU-2022:4150-1","SUSE-SU-2022:4151-1","SUSE-SU-2022:4592-1","SUSE-SU-2022:4593-1","SUSE-SU-2023:0187-1","SUSE-SU-2023:0326-1","openSUSE-SU-2022:0770-1","openSUSE-SU-2024:10666-1","openSUSE-SU-2024:12371-1","openSUSE-SU-2024:12512-1","openSUSE-SU-2024:12513-1"],"references":[{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1919391"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containernetworking/cni","events":[{"introduced":"0"},{"fixed":"9fc34aee0a6396d6484992035819c92c42522eea"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.8.1"}]}}],"versions":["spec-v0.4.0","v0.1.0","v0.2.0-rc0","v0.3.0","v0.3.0-rc0","v0.3.0-rc1","v0.3.0-rc2","v0.4.0","v0.5.0","v0.5.0-rc1","v0.5.1","v0.5.2","v0.6.0","v0.6.0-rc1","v0.6.0-rc2","v0.7.0","v0.7.0-alpha0","v0.7.0-alpha1","v0.7.0-rc1","v0.7.0-rc2","v0.7.1","v0.8.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20206.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}