Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-3zm9-mtqp-5qdt
Summary
Podman Path Traversal Vulnerability leads to arbitrary file read/write
A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
Aliases
0
alias CVE-2019-10152
1
alias GHSA-rh5f-2w6r-q7vj
Fixed_packages
0
url pkg:deb/debian/libpod@0?distro=bullseye
purl pkg:deb/debian/libpod@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye
1
url pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye
purl pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye
2
url pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye
3
url pkg:golang/github.com/containers/podman@1.4.0
purl pkg:golang/github.com/containers/podman@1.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/containers/podman@1.4.0
Affected_packages
0
url pkg:rpm/redhat/podman@1.4.4-2?arch=el7
purl pkg:rpm/redhat/podman@1.4.4-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3zm9-mtqp-5qdt
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@1.4.4-2%3Farch=el7
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10152.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10152.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10152
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58029
published_at 2026-04-18T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57888
published_at 2026-04-01T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-02T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57991
published_at 2026-04-04T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.57967
published_at 2026-04-07T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-08T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58025
published_at 2026-04-09T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-11T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.5802
published_at 2026-04-12T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58
published_at 2026-04-13T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.5803
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10152
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10152
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10152
4
reference_url https://github.com/containers/libpod
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/libpod
5
reference_url https://github.com/containers/libpod/blob/master/RELEASE_NOTES.md#140
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/libpod/blob/master/RELEASE_NOTES.md#140
6
reference_url https://github.com/containers/libpod/issues/3211
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/libpod/issues/3211
7
reference_url https://github.com/containers/libpod/pull/3214
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/libpod/pull/3214
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10152
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10152
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1715667
reference_id 1715667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1715667
10
reference_url https://access.redhat.com/errata/RHSA-2019:1907
reference_id RHSA-2019:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1907
Weaknesses
0
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
1
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-3zm9-mtqp-5qdt