Metrics
Affected Vendors & Products
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 | |
References |
|
Tue, 15 Oct 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable. | A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE. |
Title | Rancher does not automatically clean up a user deleted or disabled from the configured Authentication Provider | JWT token compromise can allow malicious actions including Remote Code Execution (RCE) |
Weaknesses | CWE-1270 | |
References |
| |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 15 Oct 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-532 | |
References |
|
Tue, 15 Oct 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue. | A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable. |
Title | Rancher 'Audit Log' leaks sensitive information | Rancher does not automatically clean up a user deleted or disabled from the configured Authentication Provider |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 15 Oct 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Oct 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Innsertion of Sensitive Information into Log File vulnerability in SUSE SUSE Manager Server Module 4.2 spacewalk-java, SUSE SUSE Manager Server Module 4.3 spacewalk-java causes sensitive information to be logged. This issue affects SUSE Manager Server Module 4.2: before 4.2.50-150300.3.66.5; SUSE Manager Server Module 4.3: before 4.3.58-150400.3.46.4. | A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue. |
Title | Rancher 'Audit Log' leaks sensitive information | |
References |
| |
Metrics |
cvssV3_1
|
cvssV4_0
|
Tue, 24 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Status: PUBLISHED
Assigner: suse
Published: 2023-09-20T08:12:34.130Z
Updated: 2024-10-15T13:15:32.628Z
Reserved: 2023-01-05T10:40:08.605Z
Link: CVE-2023-22644
Updated: 2024-08-02T10:13:49.392Z
Status : Modified
Published: 2023-09-20T09:15:12.837
Modified: 2024-11-21T07:45:07.143
Link: CVE-2023-22644
No data.