Vulnerability Description
A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:3718
- https://access.redhat.com/errata/RHSA-2024:6685
- https://access.redhat.com/errata/RHSA-2024:6687
- https://access.redhat.com/errata/RHSA-2024:6689
- https://access.redhat.com/errata/RHSA-2024:6691
- https://access.redhat.com/errata/RHSA-2024:6705
- https://access.redhat.com/security/cve/CVE-2024-7387
- https://bugzilla.redhat.com/show_bug.cgi?id=2302259
- https://github.com/openshift/builder/commit/0b62633adfa2836465202bc851885e078ec8
- https://stuxxn.github.io/advisory/2024/10/02/openshift-build-docker-priv-esc.htm
FAQ
What is CVE-2024-7387?
CVE-2024-7387 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder c...
How severe is CVE-2024-7387?
CVE-2024-7387 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-7387?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.