8.8
CVE-2021-3344
- EPSS 0.68%
- Published 16.03.2021 22:15:11
- Last modified 21.11.2024 06:21:20
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This affects github.com/openshift/builder v0.0.0-20210125201112-7901cb396121 and before.
Data is provided by the National Vulnerability Database (NVD)
Redhat ≫ Openshift Builder Version < 2021-01-26
Redhat ≫ Openshift Container Platform Version >= 4.5 < 4.5.33
Redhat ≫ Openshift Container Platform Version >= 4.6 < 4.6.16
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.68% | 0.691 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.