CVE-2025-8283 - External Control of System or Configuration Setting

Severity

37%

Complexity

22%

Confidentiality

23%

A vulnerability was found in the netavark package, a network stack for containers used with Podman. Due to dns.podman search domain being removed, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a container with a given name, this name will be used as the hostname for the container itself, as the podman's search domain is not added anymore the container is using the host's resolv.conf, and the DNS resolver will try to look into the search domains contained on it. If one of the domains contain a name with the same hostname as the running container, the connection will forward to unexpected external servers.

CVSS 3.1 Base Score 3.7. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).

Demo Examples

External Control of System or Configuration Setting

CWE-15

The following C code accepts a number as one of its command line parameters and sets it as the host ID of the current machine.


               
...

Although a process must be privileged to successfully invoke sethostid(), unprivileged users may be able to invoke the program. The code in this example allows user input to directly control the value of a system setting. If an attacker provides a malicious value for host ID, the attacker can misidentify the affected machine on the network or cause other unintended behavior.

External Control of System or Configuration Setting

CWE-15

The following Java code snippet reads a string from an HttpServletRequest and sets it as the active catalog for a database Connection.


               
...

In this example, an attacker could cause an error by providing a nonexistent catalog name or connect to an unauthorized portion of the database.

Overview

Type

Red Hat

First reported 3 weeks ago

2025-07-28 19:15:00

Last updated 1 week ago

2025-08-11 19:03:00

Affected Software

Red Hat Enterprise Linux 8.0

8.0

Red Hat Openshift Container Platform 4.0

4.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.