Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j5hq-5jcr-xwx7

Опубликовано: 20 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.7

Описание

github.com/rancher/steve's users can issue watch commands for arbitrary resources

Impact

A vulnerability has been discovered in Steve API (Kubernetes API Translator) in which users can watch resources they are not allowed to access, when they have at least some generic permissions on the type. For example, a user who can get a single secret in a single namespace can get all secrets in every namespace.

During a watch request for a single ID, the following occurs:

  • In the case of a watch request for a single resource, Steve API will return a partition with the requested resource in it. In other cases, it will check the user's access when constructing partitions.
  • When a watch request for a single resource is issued, instead of using a client which impersonates the user making the request, Steve API will use the admin client, which can read all resources.

This allows any requester to see the contents of any object such as secret keys, signing certificates, API tokens.

Please consult the associated MITRE ATT&CK - Technique - Valid Accounts and MITRE ATT&CK - Technique - Container and Resource Discovery for further information about this category of attack.

Patches

To address this issue, the fix introduces a change in the behavior of the Steve API.

When issuing a watch request with an ID specified, the requester's permissions are now correctly honoured. This will deny events for objects the requester cannot actually access. Previously these events were returned unconditionally, allowing any requester to see the contents of any object.

Patched versions include the following commits:

Workarounds

There are no workarounds for this issue. Users are recommended to upgrade, as soon as possible, to a version of Steve API/Rancher Manager which contains the fixes.

References

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/rancher/steve

go
Затронутые версииВерсия исправления

< 0.0.0-20241029132712-2175e090fe4b

0.0.0-20241029132712-2175e090fe4b

EPSS

Процентиль: 42%
0.00203
Низкий

7.7 High

CVSS3

Дефекты

CWE-200
CWE-287

Связанные уязвимости

CVSS3: 7.7
nvd
10 месяцев назад

A Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SUSE rancher which allows users to watch resources they are not allowed to access, when they have at least some generic permissions on the type. This issue affects rancher: before 2175e09, before 6e30359, before c744f0b.

EPSS

Процентиль: 42%
0.00203
Низкий

7.7 High

CVSS3

Дефекты

CWE-200
CWE-287