Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-45497

Опубликовано: 15 дек. 2024
Источник: redhat
CVSS3: 7.6
EPSS Низкий

Описание

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7org.arquillian.cube/arquillian-cube-openshift-apiOut of support scope
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-apiserver-rhel9Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-controller-manager-rhel9Affected
Red Hat OpenShift Container Platform 4.12openshift4/ose-cluster-openshift-apiserver-operatorFixedRHSA-2025:1027010.07.2025
Red Hat OpenShift Container Platform 4.13openshift4/ose-cluster-openshift-apiserver-operatorFixedRHSA-2025:1074717.07.2025
Red Hat OpenShift Container Platform 4.14openshift4/ose-cluster-openshift-apiserver-operatorFixedRHSA-2025:975902.07.2025
Red Hat OpenShift Container Platform 4.16openshift4/ose-cluster-openshift-apiserver-rhel9-operatorFixedRHSA-2025:976502.07.2025
Red Hat OpenShift Container Platform 4.17openshift4/ose-cluster-openshift-apiserver-rhel9-operatorFixedRHSA-2025:1029409.07.2025
Red Hat OpenShift Container Platform 4.18openshift4/ose-cluster-openshift-apiserver-rhel9-operatorFixedRHSA-2025:926926.06.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=2308673openshift-api: openshift-controller-manager/build: Build Process in OpenShift Allows Overwriting of Node Pull Credentials

EPSS

Процентиль: 68%
0.00581
Низкий

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 7.6
nvd
около 1 года назад

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

CVSS3: 7.6
github
около 1 года назад

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

EPSS

Процентиль: 68%
0.00581
Низкий

7.6 High

CVSS3