Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Cluster admins can follow the instructions in "Securing Builds by Strategy" to block use of the "Docker" and “Source” build strategies on a cluster, or restrict the use to a set of highly trusted users, until the cluster is able to be upgraded. https://docs.openshift.com/container-platform/4.16/cicd/builds/securing-builds-by-strategy.html
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2818 | A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container. |
Github GHSA |
GHSA-j8gh-87rx-c7w9 | OpenShift Controller Manager Improper Privilege Management |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 09 Jan 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.17::el9 | |
| References |
|
Thu, 19 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.12::el8 | |
| References |
|
Thu, 19 Sep 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.15::el8 cpe:/a:redhat:openshift:4.15::el9 |
|
| References |
|
Thu, 19 Sep 2024 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.14::el8 cpe:/a:redhat:openshift:4.16::el9 |
|
| References |
|
Thu, 19 Sep 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.13::el8 | |
| References |
|
Tue, 17 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Sep 2024 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift | Openshift-controller-manager: elevated build pods can lead to node compromise in openshift |
| First Time appeared |
Redhat
Redhat openshift |
|
| CPEs | cpe:/a:redhat:openshift:4 | |
| Vendors & Products |
Redhat
Redhat openshift |
|
| References |
|
Mon, 16 Sep 2024 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container. | |
| Title | openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-25T19:22:58.226Z
Reserved: 2024-08-30T10:12:13.684Z
Link: CVE-2024-45496
Updated: 2024-09-17T15:05:11.698Z
Status : Deferred
Published: 2024-09-17T00:15:52.433
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-45496
OpenCVE Enrichment
No data.
EUVD
Github GHSA