Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c85r-fwc7-45vc

Опубликовано: 08 фев. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.6
CVSS3: 7.2

Описание

Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespaces in 'core'

Impact

A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive * permissions for core namespaces. This can lead to someone being capable of accessing, creating, updating, or deleting a namespace in the project. This includes reading or updating a namespace in the project so that it is available in other projects in which the user has the "manage-namespaces" permission or updating another namespace in which the user has normal "update" permissions to be moved into the project.

The expected behavior is to not be able to create, update, or delete a namespace in the project or move another namespace into the project since the user doesn't have any permissions on namespaces in the core API group.

Moving a namespace to another project could lead to leakage of secrets, in case the targeted project has secrets. And also can lead to the namespace being able to abuse the resource quotas of the targeted project.

Patches

Patched versions include releases 2.6.14, 2.7.10 and 2.8.2.

Workarounds

There is no direct mitigation besides updating Rancher to a patched version.

References

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.6.0, < 2.6.14

2.6.14

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.7.0, < 2.7.10

2.7.10

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.8.0, < 2.8.2

2.8.2

EPSS

Процентиль: 26%
0.0009
Низкий

8.6 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.2
nvd
больше 1 года назад

A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive * permissions for core namespaces. This can lead to someone being capable of accessing, creating, updating, or deleting a namespace in the project.

EPSS

Процентиль: 26%
0.0009
Низкий

8.6 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-269