CVE-2017-15137

Impact:
Moderate
Public Date:
2018-03-28
CWE:
CWE-20
Bugzilla:
1566191: CVE-2017-15137 atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag
The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.

Find out more about CVE-2017-15137 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 4.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat OpenShift Container Platform 3.9 (atomic-openshift) RHBA-2018:0489 2018-03-28

Affected Packages State

Platform Package State
Red Hat OpenShift Enterprise 3.10 atomic-openshift Not affected
Red Hat OpenShift Container Platform 3.7 atomic-openshift Affected

Acknowledgements

This issue was discovered by Ben Parees (Red Hat).

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.