CVE-2023-22644

A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:suse:manager_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_server:*:*:*:*:*:*:*:*

History

15 Oct 2024, 14:15

Type Values Removed Values Added
CWE CWE-287 CWE-1270
Summary (en) A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable. (en) A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
References
  • {'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650', 'source': 'meissner@suse.de'}
  • {'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc', 'source': 'meissner@suse.de'}
  • () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32188 -
  • () https://github.com/neuvector/neuvector/security/advisories/GHSA-622h-h2p8-743x -

15 Oct 2024, 12:15

Type Values Removed Values Added
CWE CWE-532 CWE-287
References
  • {'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22649', 'source': 'meissner@suse.de'}
  • {'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr', 'source': 'meissner@suse.de'}
  • () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650 -
  • () https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc -
Summary (en) A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue. (en) A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable.

15 Oct 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-20 09:15

Updated : 2024-10-15 14:15


NVD link : CVE-2023-22644

Mitre link : CVE-2023-22644

CVE.ORG link : CVE-2023-22644


JSON object : View

Products Affected

suse

  • manager_server
CWE
CWE-1270

Generation of Incorrect Security Tokens