In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-06-06T15:07:30
Updated: 2024-08-04T23:17:39.668Z
Reserved: 2019-05-21T00:00:00
Link: CVE-2019-12274
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-06-06T16:29:01.247
Modified: 2024-11-21T04:22:32.647
Link: CVE-2019-12274
Redhat
No data.