Lucene search

K
githubGitHub Advisory DatabaseGHSA-J8GH-87RX-C7W9
HistorySep 17, 2024 - 12:31 a.m.

OpenShift Controller Manager Improper Privilege Management

2024-09-1700:31:06
CWE-269
GitHub Advisory Database
github.com
3
openshift
privilege management
security flaw
git-clone container

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

AI Score

7.5

Confidence

High

EPSS

0

Percentile

16.4%

A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform’s build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.

Affected configurations

Vulners
Node
openshift-origin-controller_projectopenshift-origin-controllerRange<0.0.0-alpha.0.0.20240911ruby
VendorProductVersionCPE
openshift-origin-controller_projectopenshift-origin-controller*cpe:2.3:a:openshift-origin-controller_project:openshift-origin-controller:*:*:*:*:*:ruby:*:*

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

AI Score

7.5

Confidence

High

EPSS

0

Percentile

16.4%

Related for GHSA-J8GH-87RX-C7W9