Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7h8m-pvw3-5gh4

Опубликовано: 25 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.4
CVSS3: 9.1

Описание

Rancher allows privilege escalation in Windows nodes due to Insecure Access Control Lists

Impact

A vulnerability has been identified whereby Rancher Manager deployments containing Windows nodes have weak Access Control Lists (ACL), allowing BUILTIN\Users or NT AUTHORITY\Authenticated Users to view or edit sensitive files which could lead to privilege escalation.

The affected files include binaries, scripts, configuration and log files:

C:\etc\rancher\wins\config C:\var\lib\rancher\agent\rancher2_connection_info.json C:\etc\rancher\rke2\config.yaml.d\50-rancher.yaml C:\var\lib\rancher\agent\applied\*-*-applied.plan C:\usr\local\bin\rke2 C:\var\lib\rancher\capr\idempotence\idempotent.sh

RKE2 nodes expand the list to include the files below:

C:\etc\rancher\node\password C:\var\lib\rancher\rke2\agent\logs\kubelet.log C:\var\lib\rancher\rke2\data\v1.**.**-rke2r*-windows-amd64-*\bin\* C:\var\lib\rancher\rke2\bin\*

This vulnerability is exclusive to deployments that contain Windows nodes. Linux-only environments are not affected by it.

Please consult the associated MITRE ATT&CK - Technique - Exploitation for Privilege Escalation for further information about this category of attack.

Patches

Patched versions include Rancher Manager 2.8.9 and 2.9.3. For RKE2 Windows nodes, please refer to its specific advisory. No patches are available for 2.7, therefore users are urged to upgrade to newer minor versions or to apply the manual workaround below.

Workarounds

Users are advised to upgrade to a patched version of Rancher Manager. When that is not possible, users can enforce stricter ACLs for all sensitive files affected by this Security Advisory running this PowerShell script as an Administrator on each node.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.7.0, < 2.8.9

2.8.9

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.9.0, < 2.9.3

2.9.3

EPSS

Процентиль: 1%
0.00011
Низкий

9.4 Critical

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-269
CWE-732

Связанные уязвимости

CVSS3: 6.6
nvd
10 месяцев назад

A Improper Privilege Management vulnerability in SUSE rancher in RoleTemplateobjects when external=true is set can lead to privilege escalation in specific scenarios.This issue affects rancher: from 2.7.0 before 2.7.14, from 2.8.0 before 2.8.5.

CVSS3: 9.1
fstec
больше 1 года назад

Уязвимость программного инструмента для управления Kubernetes-кластерами Rancher Manager, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю повысить свои привилегии

suse-cvrf
больше 1 года назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 1%
0.00011
Низкий

9.4 Critical

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-269
CWE-732