Логотип exploitDog
bind:CVE-2024-7387
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7387

Количество 4

Количество 4

redhat логотип

CVE-2024-7387

больше 1 года назад

A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2024-7387

больше 1 года назад

A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-qqv8-ph7f-h3f7

больше 1 года назад

OpenShift Builder has a path traversal, allows command injection in privileged BuildContainer

CVSS3: 9.1
EPSS: Низкий
fstec логотип

BDU:2024-07713

больше 1 года назад

Уязвимость компонента openshift4/ose-docker-builder корпоративной платформы Red Hat OpenShift Container Platform, позволяющая нарушителю повысить свои привилегии на узле, на котором выполняется контейнер

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-7387

A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.

CVSS3: 9.1
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-7387

A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.

CVSS3: 9.1
1%
Низкий
больше 1 года назад
github логотип
GHSA-qqv8-ph7f-h3f7

OpenShift Builder has a path traversal, allows command injection in privileged BuildContainer

CVSS3: 9.1
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-07713

Уязвимость компонента openshift4/ose-docker-builder корпоративной платформы Red Hat OpenShift Container Platform, позволяющая нарушителю повысить свои привилегии на узле, на котором выполняется контейнер

CVSS3: 9.1
1%
Низкий
больше 1 года назад

Уязвимостей на страницу