Impact
A flaw in certain Web Terminal images allows a container user with group membership in the root group to alter the /etc/passwd file, which is created with group‑writable permissions. By editing that file an attacker can add a user with any arbitrary UID, including 0, granting full root privileges inside the container. The weakness is an improper permission assignment (CWE‑276).
Affected Systems
The affected product is Red Hat Web Terminal. Any container built from the vulnerable image that leaves /etc/passwd group‑writable is susceptible. Specific versions are not listed; therefore any configuration using the problematic image could be impacted. The vulnerability does not affect the host system directly unless the attacker can escape the container.
Risk and Exploitability
The CVSS score of 6.4 indicates a moderate severity. No EPSS score is available and the flaw is not in the CISA KEV catalog, so the exploitation likelihood is uncertain. An attacker who can execute commands inside the container and is a member of the root group can exploit the issue; correcting the file permissions or applying a vendor patch removes the escalation path.
OpenCVE Enrichment