CVE-2024-7387
🟠 Łataj w tym tygodniu
Wstrzyknięcie poleceń w OpenShift Builder umożliwia eskalację uprawnień na węźle.
CVSS
9.1
EPSS
0.8%
Exploit
none
Vendor
Opis źródłowy (NVD)
A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.
path-traversal rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.8% |
| Opublikowano (NVD) | 2024-09-17 00:15:52 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-24 17:16:25 UTC |
Referencje
- https://access.redhat.com/errata/RHSA-2024:3718 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:6685 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:6687 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:6689 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:6691 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:6705 (secalert@redhat.com)
- https://access.redhat.com/security/cve/CVE-2024-7387 (secalert@redhat.com)
- https://bugzilla.redhat.com/show_bug.cgi?id=2302259 (secalert@redhat.com)
- https://github.com/openshift/builder/commit/0b62633adfa2836465202bc851885e078ec888d1 (secalert@redhat.com)
- https://stuxxn.github.io/advisory/2024/10/02/openshift-build-docker-priv-esc.html (secalert@redhat.com)