{
  "threat_severity" : "Important",
  "public_date" : "2015-08-19T00:00:00Z",
  "bugzilla" : {
    "description" : "OpenShift3: Exec operations should be forbidden to privileged pods such as builder pods",
    "id" : "1255120",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1255120"
  },
  "cvss" : {
    "cvss_base_score" : "6.5",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-862",
  "details" : [ "Red Hat OpenShift Enterprise 3.0.0.0 does not properly check permissions, which allows remote authenticated users with build permissions to execute arbitrary shell commands with root permissions on arbitrary build pods via unspecified vectors.", "An improper permission check issue was discovered in the server admission control component in OpenShift. A user with build permissions could use this flaw to execute arbitrary shell commands on a build pod with the privileges of the root user." ],
  "acknowledgement" : "This issue was discovered by Cesar Wong (Red Hat OpenShift Enterprise Team).",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Enterprise 3.0",
    "release_date" : "2015-08-20T00:00:00Z",
    "advisory" : "RHSA-2015:1650",
    "cpe" : "cpe:/a:redhat:openshift:3.0::el7",
    "package" : "openshift-0:3.0.1.0-1.git.527.f8d5fed.el7ose"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2015-5222\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-5222" ],
  "name" : "CVE-2015-5222",
  "csaw" : false
}