A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10152
https://github.com/containers/libpod/blob/master/RELEASE_NOTES.md#140
Source: MITRE
Published: 2019-07-30
Updated: 2020-09-30
Type: CWE-59
Base Score: 2.6
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:N
Impact Score: 4.9
Exploitability Score: 1.9
Severity: LOW
Base Score: 7.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
Impact Score: 5.8
Exploitability Score: 0.8
Severity: HIGH