PowerShell Command Injection in Podman HyperV Machine
Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.
References
Affected products
- ==>= 4.8.0, < 5.8.2
Matching in nixpkgs
pkgs.podman
Program for managing pods, containers and container images
pkgs.podman-tui
Podman Terminal UI
pkgs.podman-bootc
Streamlining podman+bootc interactions
pkgs.cockpit-podman
Cockpit UI for podman containers
pkgs.podman-compose
Implementation of docker-compose with podman backend
pkgs.podman-desktop
Graphical tool for developing on containers and Kubernetes
pkgs.nomad-driver-podman
Podman task driver for Nomad
pkgs.python312Packages.podman
Python bindings for Podman's RESTful API
pkgs.python313Packages.podman
Python bindings for Podman's RESTful API
pkgs.python314Packages.podman
Python bindings for Podman's RESTful API
Package maintainers
-
@lucasew Lucas Eduardo Wendt <lucas59356@gmail.com>
-
@alexandru0-dev Alexandru Nechita <alexandru.italia32+nixpkgs@gmail.com>
-
@andre4ik3 andre4ik3 <andre4ik3@fastmail.com>
-
@cpcloud Phillip Cloud
-
@vdemeester Vincent Demeester <vincent@sbr.pm>
-
@saschagrunert Sascha Grunert <mail@saschagrunert.de>
-
@evan-goode Evan Goode <mail@evangoo.de>
-
@kaynetik Aleksandar Nesovic <aleksandar@nesovic.dev>
-
@sikmir Nikolay Korotkiy <sikmir@disroot.org>
-
@booxter Ihar Hrachyshka <ihar.hrachyshka@gmail.com>
-
@aaronjheng Aaron Jheng <wentworth@outlook.com>
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>