Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j8gh-87rx-c7w9

Опубликовано: 17 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.4
CVSS3: 9.9

Описание

OpenShift Controller Manager Improper Privilege Management

A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.

Пакеты

Наименование

github.com/openshift/openshift-controller-manager

go
Затронутые версииВерсия исправления

< 0.0.0-alpha.0.0.20240911

0.0.0-alpha.0.0.20240911

EPSS

Процентиль: 32%
0.00123
Низкий

6.4 Medium

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 9.9
redhat
больше 1 года назад

A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.

CVSS3: 9.9
nvd
больше 1 года назад

A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.

CVSS3: 9.9
fstec
больше 1 года назад

Уязвимость корпоративной платформы Red Hat OpenShift Container Platform, связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды

EPSS

Процентиль: 32%
0.00123
Низкий

6.4 Medium

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-269