It was found that volume security can be sidestepped with innocent emptyDir and subpath. This could give an attacker with access to a pod full control over the node host by gaining access to docker socket.
Find out more about CVE-2017-1002101 from the MITRE CVE dictionary dictionary and NIST NVD.
This flaw allows a pod to mount any part of the host filesystem. The pod will run with the security contraints placed on the user but could read anything with o=rx mode and appropriate SELinux label.
CVSS3 Base Score | 7.2 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Errata | Release Date |
---|---|---|
Red Hat OpenShift Container Platform 3.6 (atomic-openshift) | RHSA-2018:0475 | 2018-03-12 |
Red Hat OpenShift Container Platform 3.7 (atomic-openshift) | RHSA-2018:0475 | 2018-03-12 |
Red Hat OpenShift Container Platform 3.4 (atomic-openshift) | RHSA-2018:0475 | 2018-03-12 |
Red Hat OpenShift Container Platform 3.5 (atomic-openshift) | RHSA-2018:0475 | 2018-03-12 |
Red Hat OpenShift Container Platform 3.3 (atomic-openshift) | RHSA-2018:0475 | 2018-03-12 |
Platform | Package | State |
---|---|---|
Red Hat OpenShift Enterprise 3 | Storage | Affected |
Red Hat Gluster Storage 3 | heketi | Not affected |
Red Hat Enterprise Linux 7 | kubernetes | Will not fix |