First published: Tue Jul 30 2019(Updated: )
An issue was discovered that affects the following versions of Rancher: v2.0.0 through v2.0.13, v2.1.0 through v2.1.8, and v2.2.0 through 2.2.1. When Rancher starts for the first time, it creates a default admin user with a well-known password. After initial setup, the Rancher administrator may choose to delete this default admin user. If Rancher is restarted, the default admin user will be recreated with the well-known default password. An attacker could exploit this by logging in with the default admin credentials. This can be mitigated by deactivating the default admin user rather than completing deleting them.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rancher | >=2.0.0<=2.0.13 | |
SUSE Rancher | >=2.1.0<=2.1.8 | |
SUSE Rancher | >=2.2.0<=2.2.1 | |
go/github.com/rancher/rancher | >=2.2.0<2.2.2 | 2.2.2 |
go/github.com/rancher/rancher | >=2.1.0<=2.1.8 | |
go/github.com/rancher/rancher | >=2.0.0<=2.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The following versions of Rancher are affected by CVE-2019-11202: v2.0.0 through v2.0.13, v2.1.0 through v2.1.8, and v2.2.0 through 2.2.1.
CVE-2019-11202 has a severity rating of 9.8 (Critical).
CVE-2019-11202 allows for the creation of a default admin user with a well-known password during the initial setup of Rancher.
To fix CVE-2019-11202 in Rancher, it is recommended to update to a version that is not affected by the vulnerability.
More information about CVE-2019-11202 can be found on the Rancher forums and the official Rancher documentation.