An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local
cluster, resulting in the secret being deleted, but their read-level
permissions to the secret being preserved. When this operation was
followed-up by other specially crafted commands, it could result in the
user gaining access to tokens belonging to service accounts in the local cluster.
This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-269 |
Wed, 09 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4. | An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4. |
Weaknesses | CWE-267 |
MITRE
Status: PUBLISHED
Assigner: suse
Published: 2023-06-01T12:52:49.035Z
Updated: 2024-10-09T08:30:39.548Z
Reserved: 2023-01-05T10:40:08.605Z
Link: CVE-2023-22647
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-06-01T13:15:10.467
Modified: 2024-11-21T07:45:07.430
Link: CVE-2023-22647
Redhat
No data.