A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2818 A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Github GHSA Github GHSA GHSA-j8gh-87rx-c7w9 OpenShift Controller Manager Improper Privilege Management
Fixes

Solution

No solution given by the vendor.


Workaround

Cluster admins can follow the instructions in "Securing Builds by Strategy" to block use of the "Docker" and “Source” build strategies on a cluster, or restrict the use to a set of highly trusted users, until the cluster is able to be upgraded. https://docs.openshift.com/container-platform/4.16/cicd/builds/securing-builds-by-strategy.html

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00212}

epss

{'score': 0.0025}


Thu, 09 Jan 2025 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.17::el9
References

Thu, 19 Sep 2024 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.12::el8
References

Thu, 19 Sep 2024 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.15::el8
cpe:/a:redhat:openshift:4.15::el9
References

Thu, 19 Sep 2024 08:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.14::el8
cpe:/a:redhat:openshift:4.16::el9
References

Thu, 19 Sep 2024 02:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift:4.13::el8
References

Tue, 17 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Sep 2024 00:15:00 +0000

Type Values Removed Values Added
Title openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift Openshift-controller-manager: elevated build pods can lead to node compromise in openshift
First Time appeared Redhat
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
Vendors & Products Redhat
Redhat openshift
References

Mon, 16 Sep 2024 11:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Title openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift
Weaknesses CWE-269
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-08-27T13:57:03.313Z

Reserved: 2024-08-30T10:12:13.684Z

Link: CVE-2024-45496

cve-icon Vulnrichment

Updated: 2024-09-17T15:05:11.698Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-17T00:15:52.433

Modified: 2025-01-09T09:15:07.600

Link: CVE-2024-45496

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-16T07:55:00Z

Links: CVE-2024-45496 - Bugzilla

cve-icon OpenCVE Enrichment

No data.