CVE-2024-7387: OpenShift Builder has a path traversal, allows command injection in privileged BuildContainer
(updated )
A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the spec.source.secrets.secret.destinationDir
attribute of the BuildConfig
definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.
References
- access.redhat.com/errata/RHSA-2024:6685
- access.redhat.com/errata/RHSA-2024:6687
- access.redhat.com/errata/RHSA-2024:6689
- access.redhat.com/errata/RHSA-2024:6691
- access.redhat.com/errata/RHSA-2024:6705
- access.redhat.com/security/cve/CVE-2024-7387
- bugzilla.redhat.com/show_bug.cgi?id=2302259
- github.com/advisories/GHSA-qqv8-ph7f-h3f7
- github.com/openshift/builder
- github.com/openshift/builder/commit/0b62633adfa2836465202bc851885e078ec888d1
- nvd.nist.gov/vuln/detail/CVE-2024-7387
- pkg.go.dev/vuln/GO-2024-3129
Detect and mitigate CVE-2024-7387 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →