The basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker able to edit a GlusterFS StorageClass is able to obtain the value of restuserkey.
Acknowledgments: Name: Morten Skou (UFST), Rune Henriksen (UFST)
Mitigation: Use of the restuserkey in GlusterFS StorageClass is deprecated upstream [1] and will be removed in a future release. To mitigate this vulnerability make use of secretName, and secretNamespace parameters to store the Gluster REST service password. [1] https://kubernetes.io/docs/concepts/storage/storage-classes/#glusterfs