A flaw was found in fence agents that rely on SSH/Telnet....
High severity
Unreviewed
Published
Aug 12, 2024
to the GitHub Advisory Database
•
Updated Aug 19, 2024
Description
Published by the National Vulnerability Database
Aug 12, 2024
Published to the GitHub Advisory Database
Aug 12, 2024
Last updated
Aug 19, 2024
A flaw was found in fence agents that rely on SSH/Telnet. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.
References