In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
References
Link | Resource |
---|---|
https://forums.rancher.com/c/announcements | Release Notes Vendor Advisory |
https://forums.rancher.com/t/rancher-release-v2-2-4-addresses-rancher-cve-2019-12274-and-cve-2019-12303/14466 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Apr 2022, 23:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:* |
Information
Published : 2019-06-06 16:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-12274
Mitre link : CVE-2019-12274
CVE.ORG link : CVE-2019-12274
JSON object : View
Products Affected
suse
- rancher