CVE-2024-7387

CRITICAL

Openshift Builder - Path Traversal

Title source: rule

Description

A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.

Exploits (4)

nomisec SUSPICIOUS
by biggerbangg · poc
https://github.com/biggerbangg/cve-2024-7387
nomisec SUSPICIOUS
by b334r · poc
https://github.com/b334r/cve-2024-7387
nomisec WORKING POC
by pwnc4t · poc
https://github.com/pwnc4t/cve-2024-7387
nomisec WORKING POC
by tevsho · poc
https://github.com/tevsho/cve-2024-7387

Scores

CVSS v3 9.1
EPSS 0.0079
EPSS Percentile 74.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-250
Status published
Products (7)
openshift/builder 0Go
Red Hat/Red Hat OpenShift Container Platform 4.12 v4.12.0-202409121032.p1.g609473f.assembly.stream.el8
Red Hat/Red Hat OpenShift Container Platform 4.13 v4.13.0-202409120505.p1.g2c7e99d.assembly.stream.el8
Red Hat/Red Hat OpenShift Container Platform 4.14 v4.14.0-202409111409.p1.g52565ca.assembly.stream.el8
Red Hat/Red Hat OpenShift Container Platform 4.15 v4.15.0-202409101936.p1.ge7749a3.assembly.stream.el8
Red Hat/Red Hat OpenShift Container Platform 4.16 v4.16.0-202409101737.p1.gfee4b58.assembly.stream.el9
Red Hat/Red Hat OpenShift Container Platform 4.17 v4.17.0-202409122005.p1.gcfcf3bd.assembly.stream.el9
Published Sep 17, 2024
Tracked Since Feb 18, 2026