{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-7387","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-08-01T15:14:15.077Z","datePublished":"2024-09-16T23:58:35.176Z","dateUpdated":"2026-03-24T16:12:23.008Z"},"containers":{"cna":{"title":"Openshift/builder: path traversal allows command injection in privileged buildcontainer using docker build strategy","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container."}],"affected":[{"versions":[{"status":"affected","version":"0","lessThan":"0b62633adfa2836465202bc851885e078ec888d1","versionType":"git"}],"packageName":"openshift/builder","collectionURL":"https://github.com/openshift/builder","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.12","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"openshift4/ose-docker-builder","defaultStatus":"affected","versions":[{"version":"v4.12.0-202409121032.p1.g609473f.assembly.stream.el8","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.12::el8"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.13","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"openshift4/ose-docker-builder","defaultStatus":"affected","versions":[{"version":"v4.13.0-202409120505.p1.g2c7e99d.assembly.stream.el8","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.13::el8"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.14","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"openshift4/ose-docker-builder","defaultStatus":"affected","versions":[{"version":"v4.14.0-202409111409.p1.g52565ca.assembly.stream.el8","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.14::el8"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.15","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"openshift4/ose-docker-builder","defaultStatus":"affected","versions":[{"version":"v4.15.0-202409101936.p1.ge7749a3.assembly.stream.el8","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.15::el8","cpe:/a:redhat:openshift:4.15::el9"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.16","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"openshift4/ose-docker-builder-rhel9","defaultStatus":"affected","versions":[{"version":"v4.16.0-202409101737.p1.gfee4b58.assembly.stream.el9","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.16::el9"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.17","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"openshift4/ose-docker-builder-rhel9","defaultStatus":"affected","versions":[{"version":"v4.17.0-202409122005.p1.gcfcf3bd.assembly.stream.el9","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.17::el9"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:3718","name":"RHSA-2024:3718","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6685","name":"RHSA-2024:6685","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6687","name":"RHSA-2024:6687","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6689","name":"RHSA-2024:6689","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6691","name":"RHSA-2024:6691","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:6705","name":"RHSA-2024:6705","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2024-7387","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302259","name":"RHBZ#2302259","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/openshift/builder/commit/0b62633adfa2836465202bc851885e078ec888d1"},{"url":"https://stuxxn.github.io/advisory/2024/10/02/openshift-build-docker-priv-esc.html"}],"datePublic":"2024-09-16T08:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-250","description":"Execution with Unnecessary Privileges","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-250: Execution with Unnecessary Privileges","workarounds":[{"lang":"en","value":"Cluster admins can follow the instructions in \"Securing Builds by Strategy\" to block use of the \"Docker\" build strategy on a cluster, or restrict the use to a set of highly trusted users, until the cluster is able to be upgraded.\n\nhttps://docs.openshift.com/container-platform/4.16/cicd/builds/securing-builds-by-strategy.html"}],"timeline":[{"lang":"en","time":"2024-08-01T15:12:45.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2024-09-16T08:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Armin Stock for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-03-24T16:12:23.008Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-07T20:31:09.766421Z","id":"CVE-2024-7387","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-07T20:31:23.564Z"}}]}}