Descriptive Alt Text

Critical Vulnerabilities in Red Hat OpenShift Container Platform 4

September 17, 2024 Reading Time: 2 minutes

Red Hat has recently disclosed two critical vulnerabilities in OpenShift Container Platform 4 that require urgent attention from affected organisations. The vulnerabilities, identified as CVE-2024-45496 and CVE-2024-7387, both have critical CVSS3.0 scores, highlighting their severity.

CVE-2024-45496: Privilege Misuse in Build Process

This flaw, with a CVSS score of 9.9, occurs due to the misuse of elevated privileges during the build process of OpenShift Container Platform. Specifically, the git-clone container is run with a privileged security context, granting unrestricted access to the node. An attacker with developer-level access can exploit this by providing a crafted .gitconfig file, leading to arbitrary command execution on the worker node. This could escalate their permissions on the node running the container.

CVE-2024-7387: Command Injection via Path Traversal

This vulnerability, with a CVSS score of 9.1, affects the openshift/builder and allows command injection through path traversal. Malicious users can execute arbitrary commands on the OpenShift node running the builder container. By using the “Docker” strategy, executable files inside the privileged build container can be overridden via the spec.source.secrets.secret.destinationDir attribute of the BuildConfig definition. Attackers running code in a privileged container could escalate their permissions on the node.

Products and Components Affected

  • CVE-2024-45496: ose-openshift-controller-manager-container
  • CVE-2024-7387: openshift4/ose-docker-builder

Common Weakness Enumeration (CWE):

  • CVE-2024-45496: Improper Privilege Management
  • CVE-2024-7387: Execution with Unnecessary Privileges

Recommendations

The National Cyber Security Centre (NCSC) advises affected organisations to review Red Hat’s latest release notes and apply the necessary updates promptly. For additional details and mitigation steps, please refer to the following resources:


For tailored solutions to safeguard your business from cybersecurity threats, contact our team today .

Fill out the form below to get started, and let our experts help you enhance your cybersecurity posture. 👇

Let's Talk About Your Project

Leave us your details and one of our team will reach out to explore how we can assist with your cybersecurity requirements.

Postal address

The BASE Enterprise Centre

Railway Road

Stranorlar

Co. Donegal

Ireland

F93 VAK6

Phone number
IE: +353 74 970 7876 | UK: +44 20 4538 2818

To learn more about your data and privacy rights, visit our Privacy Statement.