Openshift Builder Vulnerability: Command Injection via Path Traversal
CVE-2024-7387

9.1CRITICAL

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-7387?

A vulnerability exists in OpenShift Builder where improper handling of file paths can lead to command injection. An attacker who exploits this vulnerability could gain the ability to execute arbitrary commands on the host running the builder container. This flaw specifically affects the use of the ‘Docker’ strategy within OpenShift, as malicious users can override executable files in the privileged build container using the spec.source.secrets.secret.destinationDir attribute in the BuildConfig definition. Should an attacker gain access to a privileged container, they could potentially escalate their permissions on the OpenShift node, leading to significant security implications.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

Credit

Red Hat would like to thank Armin Stock for reporting this issue.
.
CVE-2024-7387 : Openshift Builder Vulnerability: Command Injection via Path Traversal