First published: Wed Sep 04 2019(Updated: )
Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rancher | >=2.0.0<=2.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13209 is a vulnerability in Rancher 2 through 2.2.4 that allows an attacker to gain access to clusters managed by Rancher.
CVE-2019-13209 has a severity value of 8.7 (high).
An attacker can exploit CVE-2019-13209 by using a Cross-Site Websocket Hijacking attack to gain access to clusters managed by Rancher.
Rancher 2.0.0 through 2.0.16, Rancher 2.1.0 through 2.1.11, and Rancher 2.2.0 through 2.2.4 are affected by CVE-2019-13209.
To fix CVE-2019-13209, update your Rancher installation to version 2.2.5, 2.1.11, or 2.0.16, depending on the version you are currently using.