A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat process automation | — |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| red hat | red hat process automation | cert_advisory | 90% |
| red hat | openshift | cert_advisory | 90% |
| red hat | red hat ansible automation | cert_advisory | 90% |
| red hat | enterprise linux | cert_advisory | 90% |
Updated description with new details, changed product to 'red hat process automation 7', and updated severity to CRITICAL.
Initial creation