
Cloud Vulnerability DB
A community-led vulnerabilities database
During installation of an OpenShift 4 cluster, the openshift-install command line tool creates an auth directory containing kubeconfig and kubeadmin-password files. Both files contain credentials used to authenticate to the OpenShift API server and were incorrectly assigned world-readable permissions in OpenShift 4.2 (Red Hat CVE, NVD).
The vulnerability stems from incorrect file permissions set during the OpenShift installation process. When the openshift-install tool creates the authentication files, it sets them as world-readable (-rw-r--r--), allowing any user on the system to read sensitive credentials. This contrasts with the more secure behavior of the oc command line tool, which creates configuration files readable only by the current user (Bugzilla).
The vulnerability exposes sensitive authentication credentials to all local users on the system. Any user with local access can read the kubeconfig and kubeadmin-password files, potentially gaining unauthorized access to the OpenShift API server and cluster resources (Red Hat CVE).
The issue was addressed in OpenShift Container Platform 4.2.18 through security advisory RHSA-2020:0476. Users should upgrade to this version or later to receive the fix (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."