Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jhh6-6fhp-q2xp

Опубликовано: 18 дек. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Open Cluster Management vulnerable to Trust Boundary Violation

A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. The cluster-manager deployment uses a service account with the same name "cluster-manager" which is bound to a ClusterRole also named "cluster-manager", which includes the permission to create Pod resources. If this deployment runs a pod on an attacker-controlled node, the attacker can obtain the cluster-manager's token and steal any service account token by creating and mounting the target service account to control the whole cluster.

Пакеты

Наименование

open-cluster-management.io/ocm

go
Затронутые версииВерсия исправления

< 0.13.0

0.13.0

EPSS

Процентиль: 45%
0.00227
Низкий

7.5 High

CVSS3

Дефекты

CWE-501

Связанные уязвимости

CVSS3: 7.5
redhat
около 2 лет назад

A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. The cluster-manager deployment uses a service account with the same name "cluster-manager" which is bound to a ClusterRole also named "cluster-manager", which includes the permission to create Pod resources. If this deployment runs a pod on an attacker-controlled node, the attacker can obtain the cluster-manager's token and steal any service account token by creating and mounting the target service account to control the whole cluster.

CVSS3: 7.5
nvd
около 1 года назад

A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. The cluster-manager deployment uses a service account with the same name "cluster-manager" which is bound to a ClusterRole also named "cluster-manager", which includes the permission to create Pod resources. If this deployment runs a pod on an attacker-controlled node, the attacker can obtain the cluster-manager's token and steal any service account token by creating and mounting the target service account to control the whole cluster.

suse-cvrf
12 месяцев назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 45%
0.00227
Низкий

7.5 High

CVSS3

Дефекты

CWE-501