A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SUSE Rancher allows code execution for user with the ability to add an untrusted Helm catalog or modifying the URL configuration used to download KDM (only admin users by default) This issue affects: SUSE Rancher Rancher versions prior to 2.5.17; Rancher versions prior to 2.6.10; Rancher versions prior to 2.7.1.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-0313 A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SUSE Rancher allows code execution for user with the ability to add an untrusted Helm catalog or modifying the URL configuration used to download KDM (only admin users by default) This issue affects: SUSE Rancher Rancher versions prior to 2.5.17; Rancher versions prior to 2.6.10; Rancher versions prior to 2.7.1.
Github GHSA Github GHSA GHSA-34p5-jp77-fcrc Command injection in Rancher Git package
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2025-03-25T15:27:31.285Z

Reserved: 2022-10-26T00:00:00.000Z

Link: CVE-2022-43758

cve-icon Vulnrichment

Updated: 2024-08-03T13:40:06.453Z

cve-icon NVD

Status : Modified

Published: 2023-02-07T13:15:09.883

Modified: 2024-11-21T07:27:10.303

Link: CVE-2022-43758

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.