Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5222

Опубликовано: 19 авг. 2015
Источник: redhat
CVSS2: 6.5
EPSS Низкий

Описание

Red Hat OpenShift Enterprise 3.0.0.0 does not properly check permissions, which allows remote authenticated users with build permissions to execute arbitrary shell commands with root permissions on arbitrary build pods via unspecified vectors.

An improper permission check issue was discovered in the server admission control component in OpenShift. A user with build permissions could use this flaw to execute arbitrary shell commands on a build pod with the privileges of the root user.

Дополнительная информация

Статус:

Important
Дефект:
CWE-862
https://bugzilla.redhat.com/show_bug.cgi?id=1255120OpenShift3: Exec operations should be forbidden to privileged pods such as builder pods

EPSS

Процентиль: 64%
0.00471
Низкий

6.5 Medium

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

Red Hat OpenShift Enterprise 3.0.0.0 does not properly check permissions, which allows remote authenticated users with build permissions to execute arbitrary shell commands with root permissions on arbitrary build pods via unspecified vectors.

github
больше 3 лет назад

Red Hat OpenShift Enterprise 3.0.0.0 does not properly check permissions, which allows remote authenticated users with build permissions to execute arbitrary shell commands with root permissions on arbitrary build pods via unspecified vectors.

EPSS

Процентиль: 64%
0.00471
Низкий

6.5 Medium

CVSS2