Description
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3935 | In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml. |
Github GHSA |
GHSA-gc62-j469-9gjm | Rancher Privilege Escalation Vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:17:39.668Z
Reserved: 2019-05-21T00:00:00.000Z
Link: CVE-2019-12274
No data.
Status : Modified
Published: 2019-06-06T16:29:01.247
Modified: 2024-11-21T04:22:32.647
Link: CVE-2019-12274
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA