Описание
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
Ссылки
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.0.0 (включая) до 1.6.28 (включая)Версия от 2.0.0 (включая) до 2.2.3 (включая)
Одно из
cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*
EPSS
Процентиль: 41%
0.00191
Низкий
8.8 High
CVSS3
4 Medium
CVSS2
Дефекты
CWE-668
Связанные уязвимости
EPSS
Процентиль: 41%
0.00191
Низкий
8.8 High
CVSS3
4 Medium
CVSS2
Дефекты
CWE-668