Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3344

Опубликовано: 08 фев. 2021
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This affects github.com/openshift/builder v0.0.0-20210125201112-7901cb396121 and before.

A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Меры по смягчению последствий

The affected build strategies include docker, source and custom builds, hence these can be disabled as per the documentation[1]. This does however, exclude the Jenkins build strategy as it is not affected and does not have to be disabled. [1] https://docs.openshift.com/container-platform/4.6/builds/securing-builds-by-strategy.html On clusters where builds are allowed only grant permissions to perform builds to users who you wish to be to able to view, modify and edit all cluster resources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11atomic-openshiftNot affected
Red Hat OpenShift Container Platform 4.5openshift4/ose-docker-builderFixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-ironic-hardware-inventory-recorder-rhel8FixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-ironic-inspector-rhel8FixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-ironic-ipa-downloader-rhel8FixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-ironic-machine-os-downloader-rhel8FixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-ironic-rhel8FixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-ironic-static-ip-manager-rhel8FixedRHSA-2021:042803.03.2021
Red Hat OpenShift Container Platform 4.6openshift4/ose-docker-builderFixedRHSA-2021:030808.02.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-522
https://bugzilla.redhat.com/show_bug.cgi?id=1921450openshift/builder: privilege escalation during container image builds via mounted secrets

EPSS

Процентиль: 71%
0.00676
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 5 лет назад

A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This affects github.com/openshift/builder v0.0.0-20210125201112-7901cb396121 and before.

EPSS

Процентиль: 71%
0.00676
Низкий

8.8 High

CVSS3