CVE-2021-20182Files or Directories Accessible to External Parties in Redhat Openshift Container Platform

Severity
8.8HIGHNVD
EPSS
0.5%
top 32.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 23

Description

A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as the network and storage devices, to at least escalate their privileges to that of the cluster admin. The highest threat from this vulnerability is to data confidentiality and integrity as well as system

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5redhat/openshift_container_platformgithub.com/openshift/builder v0.0.0-20210118193943-6d10f5202a76
CVEListV5redhat/openshiftgithub.com/openshift/builder v0.0.0-20210118193943-6d10f5202a76

Patches

🔴Vulnerability Details

1
CVEList
CVE-2021-20182: A privilege escalation flaw was found in openshift4/ose-docker-builder2021-02-23

📋Vendor Advisories

1
Red Hat
openshift: builder allows read and write of block devices2021-02-02
CVE-2021-20182 — Redhat vulnerability | cvebase