CVE-2016-2160

Published on: 06/08/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:14 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Openshift from Redhat contain the following vulnerability:

Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.

  • CVE-2016-2160 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 9 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Drop capabilities in s2i build container by default by csrwng · Pull Request #7864 · openshift/origin · GitHub Patch
github.com
text/html
URL Logo CONFIRM github.com/openshift/origin/pull/7864
Red Hat Customer Portal Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1064
1316127 – (CVE-2016-2160) CVE-2016-2160 Privilege escalation when changing root password in sti builder image bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1316127

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationRedhatOpenshift3.2AllAllAll
ApplicationRedhatOpenshift3.2AllAllAll
ApplicationRedhatOpenshift Origin-AllAllAll
ApplicationRedhatOpenshift Origin-AllAllAll
  • cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*:
  • cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*:
  • cpe:2.3:a:redhat:openshift_origin:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openshift_origin:-:*:*:*:*:*:*:*: