An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
History

Wed, 09 Oct 2024 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269

Wed, 09 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4. An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
Weaknesses CWE-267

cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published: 2023-06-01T12:52:49.035Z

Updated: 2024-10-09T08:30:39.548Z

Reserved: 2023-01-05T10:40:08.605Z

Link: CVE-2023-22647

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-01T13:15:10.467

Modified: 2024-11-21T07:45:07.430

Link: CVE-2023-22647

cve-icon Redhat

No data.