First published: Thu Jan 28 2021(Updated: )
A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/github.com/openshift/builder v0.0.0-20210125201112 | <7901 | 7901 |
Red Hat OpenShift Builder | <2021-01-26 | |
Red Hat OpenShift Container Platform | >=4.5<4.5.33 | |
Red Hat OpenShift Container Platform | >=4.6<4.6.16 |
The affected build strategies include docker, source and custom builds, hence these can be disabled as per the documentation[1]. This does however, exclude the Jenkins build strategy as it is not affected and does not have to be disabled. [1] https://docs.openshift.com/container-platform/4.6/builds/securing-builds-by-strategy.html On clusters where builds are allowed only grant permissions to perform builds to users who you wish to be to able to view, modify and edit all cluster resources.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3344 is classified as a high severity privilege escalation vulnerability.
To fix CVE-2021-3344, update to OpenShift builder version 7901 or later.
CVE-2021-3344 affects users of OpenShift builder versions prior to 7901 and OpenShift Container Platform versions 4.5.33 and 4.6.16.
The implications of CVE-2021-3344 include the potential for unauthorized access to sensitive credentials during container image builds.
CVE-2021-3344 was reported in January 2021.