Bug 2302857
Summary: | CVE - [odf-console] Pod Service Account Token Automatically Mounted | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | Sanjal Katiyar <skatiyar> |
Component: | odf-operator | Assignee: | Bipul Adhikari <badhikar> |
Status: | VERIFIED --- | QA Contact: | Parag Kamble <pakamble> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 4.17 | CC: | asriram, badhikar, edonnell, muagarwa, nigoyal, odf-bz-bot |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | ODF 4.17.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | 4.17.0-105 | Doc Type: | Bug Fix |
Doc Text: |
.Automatic mounting of service account tokens disabled to increase security
By default, OpenShift automatically mounts a service account token into every pod, regardless of whether the pod needs to interact with the OpenShift API. This behavior can expose the pod’s service account token to unintended use. If a pod is compromised, the attacker could gain access to this token, leading to possible privilege escalation within the cluster.
If the default service account token is unnecessarily mounted, and the pod becomes compromised, the attacker can use the service account credentials to interact with the OpenShift API. This access could lead to serious security breaches, such as unauthorized actions within the cluster, exposure of sensitive information, or privilege escalation across the cluster.
To mitigate this vulnerability, the automatic mounting of service account tokens is disabled unless explicitly needed by the application running in the pod. In the case of ODF console pod the fix involved disabling the automatic mounting of the default service account token by setting the `automountServiceAccountToken: false` in the pod or service account definition.
With this fix, pods no longer automatically mount the service account token unless explicitly needed. This reduces the risk of privilege escalation or misuse of the service account in case of a compromised pod.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | Bug | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2281703 |
Description
Sanjal Katiyar
2024-08-05 11:45:09 UTC
Please update the RDT flag/text appropriately. |