CVE Vulnerabilities

CVE-2023-3027

Improper Privilege Management

Published: Jun 05, 2023 | Modified: Jun 12, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.8 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu

The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Advanced_cluster_management_for_kubernetes Redhat 2.5 (including) 2.5 (including)
Advanced_cluster_management_for_kubernetes Redhat 2.6 (including) 2.6 (including)
Advanced_cluster_management_for_kubernetes Redhat 2.7 (including) 2.7 (including)
Red Hat Advanced Cluster Management for Kubernetes 2.8 for RHEL 8 RedHat rhacm2/governance-policy-propagator-rhel8:v2.8.1-6 *

Potential Mitigations

References