Rapid7 Vulnerability & Exploit Database

Red Hat OpenShift: CVE-2018-10843: source-to-image: Builder images with assembler-user LABEL set to root allows attackers to execute arbitrary code

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat OpenShift: CVE-2018-10843: source-to-image: Builder images with assembler-user LABEL set to root allows attackers to execute arbitrary code

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
06/28/2018
Created
07/25/2018
Added
06/28/2018
Modified
05/10/2023

Description

source-to-image component of Openshift Container Platform before versions atomic-openshift 3.7.53, atomic-openshift 3.9.31 is vulnerable to a privilege escalation which allows the assemble script to run as the root user in a non-privileged container. An attacker can use this flaw to open network connections, and possibly other actions, on the host which are normally only available to a root user.

Solution(s)

  • linuxrpm-upgrade-atomic-openshift

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;