First published: Wed Mar 09 2016(Updated: )
It was reported that by creating a new image with root password changed and using it as a sti builder image, attackers are able to gain ROOT in it. Overridding builder image scripts(e.g. assemble) can help the attackers to access the pod and/or perform remote command execution in it. Product bugs (contain reproducer): <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1315187">https://bugzilla.redhat.com/show_bug.cgi?id=1315187</a> <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1315188">https://bugzilla.redhat.com/show_bug.cgi?id=1315188</a> Upstream bug: <a href="https://github.com/openshift/origin/pull/7864">https://github.com/openshift/origin/pull/7864</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin | ||
Red Hat OpenShift | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2160 is considered a high-severity vulnerability due to its potential for remote command execution and elevated privileges.
To fix CVE-2016-2160, ensure that you upgrade Red Hat OpenShift to a patched version that addresses this vulnerability.
The potential impacts of CVE-2016-2160 include unauthorized access to the pod and the ability to execute arbitrary commands as root.
CVE-2016-2160 affects Red Hat OpenShift Origin and Red Hat OpenShift version 3.2.
Yes, CVE-2016-2160 can be exploited remotely, allowing attackers to gain root access.