In all versions of servicemesh-operator through 1.1.3, when deploying the Service Mesh control plane the operator will deploy the ingress gateway to any namespace regardless of the current user's permissions. Additionally the image deployed as the gateway can also be specified by a user. An attacker with basic cluster permissions can exploit this to deploy their own pod into a namespace owned by kube-admin, possibly gaining access to privileged service account tokens.
Acknowledgments: Name: Daniel Grimm (Red Hat)
This issue has been addressed in the following products: OpenShift Service Mesh 1.1 Via RHSA-2020:2795 https://access.redhat.com/errata/RHSA-2020:2795
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-14306
Fix: https://github.com/maistra/istio-operator/pull/462