CVE-2024-7387 – github.com/openshift/builder
Package
Manager: go
Name: github.com/openshift/builder
Vulnerable Version: >=0 <=4.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
EPSS: 0.00691 pctl0.70913
Details
OpenShift Builder has a path traversal, allows command injection in privileged BuildContainer A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the "Docker" strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Metadata
Created: 2024-09-17T00:31:06Z
Modified: 2025-01-09T15:38:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-qqv8-ph7f-h3f7/GHSA-qqv8-ph7f-h3f7.json
CWE IDs: ["CWE-250"]
Alternative ID: GHSA-qqv8-ph7f-h3f7
Finding: F159
Auto approve: 1