First published: Wed May 31 2023(Updated: )
The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Advanced Cluster Management For Kubernetes | =2.5 | |
Redhat Advanced Cluster Management For Kubernetes | =2.6 | |
Redhat Advanced Cluster Management For Kubernetes | =2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3027 is a vulnerability in the grc-policy-propagator component of Redhat Advanced Cluster Management for Kubernetes, which allows security escalation within the cluster.
CVE-2023-3027 allows policies containing dynamically obtained values to take advantage of cluster scoped access in a created policy, leading to security escalation within the cluster.
CVE-2023-3027 has a severity rating of 7.8 (high).
Versions 2.5, 2.6, and 2.7 of Redhat Advanced Cluster Management for Kubernetes are affected by CVE-2023-3027.
To fix CVE-2023-3027, it is recommended to update to the latest version of Redhat Advanced Cluster Management for Kubernetes and follow the instructions provided by Red Hat.