Red Hat has recently disclosed two critical vulnerabilities in OpenShift Container Platform 4 that require urgent attention from affected organisations. The vulnerabilities, identified as CVE-2024-45496 and CVE-2024-7387, both have critical CVSS3.0 scores, highlighting their severity.
CVE-2024-45496: Privilege Misuse in Build Process
This flaw, with a CVSS score of 9.9, occurs due to the misuse of elevated privileges during the build process of OpenShift Container Platform. Specifically, the git-clone container is run with a privileged security context, granting unrestricted access to the node. An attacker with developer-level access can exploit this by providing a crafted .gitconfig file, leading to arbitrary command execution on the worker node. This could escalate their permissions on the node running the container.
CVE-2024-7387: Command Injection via Path Traversal
This vulnerability, with a CVSS score of 9.1, affects the openshift/builder and allows command injection through path traversal. Malicious users can execute arbitrary commands on the OpenShift node running the builder container. By using the “Docker” strategy, executable files inside the privileged build container can be overridden via the spec.source.secrets.secret.destinationDir attribute of the BuildConfig definition. Attackers running code in a privileged container could escalate their permissions on the node.
Products and Components Affected
- CVE-2024-45496: ose-openshift-controller-manager-container
- CVE-2024-7387: openshift4/ose-docker-builder
Common Weakness Enumeration (CWE):
- CVE-2024-45496: Improper Privilege Management
- CVE-2024-7387: Execution with Unnecessary Privileges
Recommendations
The National Cyber Security Centre (NCSC) advises affected organisations to review Red Hat’s latest release notes and apply the necessary updates promptly. For additional details and mitigation steps, please refer to the following resources:
For tailored solutions to safeguard your business from cybersecurity threats, contact our team today .
Fill out the form below to get started, and let our experts help you enhance your cybersecurity posture. 👇