7.6
CVE-2024-45497
- EPSS 0.37%
- Veröffentlicht 31.12.2024 03:15:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Openshift-api: openshift-controller-manager/build: build process in openshift allows overwriting of node pull credentials
A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/openshift
≫
Paket
openshift
Default Statusunknown
Version
4.16
Status
affected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.12
Default Statusaffected
Version
v4.12.0-202506062300.p0.gb870fc6.assembly.stream.el8
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version
v4.13.0-202507061330.p0.g9abb220.assembly.stream.el8
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.14
Default Statusaffected
Version
v4.14.0-202506112307.p0.g700dc11.assembly.stream.el8
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.16
Default Statusaffected
Version
v4.16.0-202506062300.p0.gd26f300.assembly.stream.el9
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.17
Default Statusaffected
Version
v4.17.0-202507011904.p0.g2b2ba3b.assembly.stream.el9
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.18
Default Statusaffected
Version
v4.18.0-202506062012.p0.g0a6f6eb.assembly.stream.el9
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.2
Default Statusaffected
Version
sha256:23043d4a73f0d25d0959030e3d9b8020e4453a748addcb5c5955415953ad30a3
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Fuse 7
Default Statusunknown
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4
Default Statusunaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.37% | 0.586 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 7.6 | 2.8 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.