9.9

CVE-2024-45496

A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/openshift/
Package openshift-controller-manager
Default Statusunaffected
Version <= 4.18.0
Version 4.12.0
Status affected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.12
Default Statusaffected
Version < *
Version v4.12.0-202409131137.p1.g0b1971a.assembly.stream.el8
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version < *
Version v4.13.0-202409130707.p1.gb75d499.assembly.stream.el8
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.14
Default Statusaffected
Version < *
Version v4.14.0-202409130708.p1.g9020ea1.assembly.stream.el8
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.15
Default Statusaffected
Version < *
Version v4.15.0-202409131835.p1.gbe9d673.assembly.stream.el9
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.16
Default Statusaffected
Version < *
Version v4.16.0-202409130937.p1.g5dcfc99.assembly.stream.el9
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.17
Default Statusaffected
Version < *
Version v4.17.0-202409182235.p0.g7682a61.assembly.stream.el9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.25% 0.48
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.