CVE Vulnerabilities

CVE-2021-3948

Incorrect Default Permissions

Published: Feb 18, 2022 | Modified: Dec 03, 2022
CVSS 3.x
6.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
6.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Ubuntu

An incorrect default permissions vulnerability was found in the mig-controller. Due to an incorrect cluster namespaces handling an attacker may be able to migrate a malicious workload to the target cluster, impacting confidentiality, integrity, and availability of the services located on that cluster.

Weakness

During installation, installed file permissions are set to allow anyone to modify those files.

Affected Software

Name Vendor Start Version End Version
Mig-controller Konveyor * 1.5.2 (excluding)
Mig-controller Konveyor 1.6.0 (including) 1.6.3 (excluding)
Red Hat Migration Toolkit for Containers 1.5 RedHat rhmtc/openshift-migration-controller-rhel8:v1.5.2-6 *
Red Hat Migration Toolkit for Containers 1.6 RedHat rhmtc/openshift-migration-controller-rhel8:v1.6.3-8 *

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References