Bug 2022017 (CVE-2021-3948) - CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
Summary: CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not a...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-3948
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2022479 2022480
Blocks: 2021991 2022409
TreeView+ depends on / blocked
 
Reported: 2021-11-10 15:10 UTC by Przemyslaw Roguski
Modified: 2025-04-04 13:27 UTC (History)
9 users (show)

Fixed In Version: konveyor/mig-controller release-1.5.2, konveyor/mig-controller release-1.6.3
Clone Of:
Environment:
Last Closed: 2022-01-20 07:31:10 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4848 0 None None None 2021-11-29 14:32:35 UTC
Red Hat Product Errata RHSA-2022:0202 0 None None None 2022-01-20 06:31:35 UTC

Description Przemyslaw Roguski 2021-11-10 15:10:34 UTC
The Migration Toolkit for Containers (MTC) enables you to migrate stateful application workloads between OpenShift Container Platform 4 clusters at the granularity of a namespace. By default the migration process should be available only for users with cluster-admin privileges on all clusters (source and target). The controller watches ALL namespaces, rather than strictly the openshift-migration namespace, what may lead to not-authorized usage of the Migration Toolkit for Containers (MTC). 

Users with permissions to create MigPlans and MigMigrations CRDs (namespace admins) may create them in their own namespace. 
That would provide a way to register their own (potentially crafted) cluster (source) with a MigCluster in their namespace on the target cluster and migrate malicious workload to the target cluster. Potentially that may lead to the exposure of sensitive information or even may provide a way to permission escalation.

Comment 4 errata-xmlrpc 2021-11-29 14:32:34 UTC
This issue has been addressed in the following products:

  Red Hat Migration Toolkit for Containers 1.5

Via RHSA-2021:4848 https://access.redhat.com/errata/RHSA-2021:4848

Comment 5 errata-xmlrpc 2022-01-20 06:31:33 UTC
This issue has been addressed in the following products:

  Red Hat Migration Toolkit for Containers 1.6

Via RHSA-2022:0202 https://access.redhat.com/errata/RHSA-2022:0202

Comment 6 Product Security DevOps Team 2022-01-20 07:31:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3948


Note You need to log in before you can comment on or make changes to this bug.