Unrestricted Access via Crafted .gitconfig File in OpenShift Build Process
Key Information
- Vendor
- Red Hat
- Status
- Red Hat Openshift Container Platform 4.12
- Red Hat Openshift Container Platform 4.13
- Red Hat Openshift Container Platform 4.14
- Red Hat Openshift Container Platform 4.15
- Vendor
- CVE Published:
- 17 September 2024
Summary
A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Affected Version(s)
Red Hat OpenShift Container Platform 4.12 <= v4.12.0-202409131137.p1.g0b1971a.assembly.stream.el8
Red Hat OpenShift Container Platform 4.13 <= v4.13.0-202409130707.p1.gb75d499.assembly.stream.el8
Red Hat OpenShift Container Platform 4.14 <= v4.14.0-202409130708.p1.g9020ea1.assembly.stream.el8
CVSS V3.1
Timeline
Risk change from: null to: 9.9 - (CRITICAL)
Vulnerability published.
Reported to Red Hat.