A flaw was found in the building of containers within OpenShift Enterprise. An attacker could submit an image for building that executes commands within the container as root, allowing them to potentially escalate privileges.
It was reported that by creating a new image with root password changed and using it as a sti builder image, attackers are able to gain ROOT in it. Overridding builder image scripts(e.g. assemble) can help the attackers to access the pod and/or perform remote command execution in it.
Product bugs (contain reproducer):
This issue has been addressed in the following products:
Red Hat OpenShift Enterprise 3.2
Via RHSA-2016:1064 https://access.redhat.com/errata/RHSA-2016:1064