Логотип exploitDog
bind:CVE-2019-12274
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12274

Количество 2

Количество 2

nvd логотип

CVE-2019-12274

больше 6 лет назад

In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gc62-j469-9gjm

больше 3 лет назад

Rancher Privilege Escalation Vulnerability

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12274

In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.

CVSS3: 8.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-gc62-j469-9gjm

Rancher Privilege Escalation Vulnerability

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу