A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
Lab | Machine | Link |
---|---|---|
Hack The Box | PikaTwoo | Go to Practice |
Hack The Box | Vessel | Go to Practice |
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-0811