A flaw was found in the OpenShift Container Platform where the initialization container for builds (git-clone) runs with elevated privileges. This misconfiguration allows an attacker with developer access to create a malicious .gitconfig file that executes arbitrary commands on a privileged build pod. As a result, the attacker can compromise the worker node hosting the build pod, potentially gaining access to all the workloads running on that node. The impact is critical, as it allows for the compromise of the node's identity and other nodes, depending on cluster configuration.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2024:6691 https://access.redhat.com/errata/RHSA-2024:6691
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2024:6689 https://access.redhat.com/errata/RHSA-2024:6689
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2024:6687 https://access.redhat.com/errata/RHSA-2024:6687
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2024:6685 https://access.redhat.com/errata/RHSA-2024:6685
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.12 Via RHSA-2024:6705 https://access.redhat.com/errata/RHSA-2024:6705