← Retour aux CVEs
CVE-2024-45496
CRITICAL9.9
Description
A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Details CVE
Score CVSS v3.19.9
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie9/17/2024
Derniere modification1/9/2025
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-269
References
https://access.redhat.com/errata/RHSA-2024:3718(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:6685(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:6687(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:6689(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:6691(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:6705(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-45496(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2308661(secalert@redhat.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.