CVE-2016-1906
server: build config to a strategy that isn't allowed by policy
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.
Openshift, permite a los atacantes remotos alcanzar privilegios mediante la actualización de una configuración de compilación que fue diseñada con un tipo permitido en un tipo que no está permitido.
An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain build-configuration strategies. A remote attacker could create build configurations with strategies that violate policy. Although the attacker could not launch the build themselves (launch fails when the policy is violated), if the build configuration files were later launched by other privileged services (such as automated triggers), user privileges could be bypassed allowing attacker escalation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-01-14 CVE Reserved
- 2016-02-03 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-285: Improper Authorization
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/openshift/origin/issues/6556 | X_refsource_confirm | |
https://github.com/openshift/origin/pull/6576 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2016:0070 | 2023-02-13 | |
https://access.redhat.com/errata/RHSA-2016:0351 | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2016-1906 | 2016-03-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1297916 | 2016-03-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kubernetes Search vendor "Kubernetes" | Kubernetes Search vendor "Kubernetes" for product "Kubernetes" | - | - |
Affected
|