Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-3738

Опубликовано: 19 мая 2016
Источник: redhat
CVSS2: 6.5
EPSS Низкий

Описание

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

A vulnerability was found in the STI build process in OpenShift Enterprise. Access to STI builds was not properly restricted, allowing an attacker to use STI builds to access the Docker socket and escalate their privileges.

Дополнительная информация

Статус:

Important
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1333461origin: pod update allows docker socket access via build-pod

EPSS

Процентиль: 72%
0.00736
Низкий

6.5 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
nvd
больше 9 лет назад

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS3: 8.8
github
больше 3 лет назад

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

EPSS

Процентиль: 72%
0.00736
Низкий

6.5 Medium

CVSS2