First published: Wed Apr 10 2019(Updated: )
In Rancher 2.0.0 through 2.1.5, project members have continued access to create, update, read, and delete namespaces in a project after they have been removed from it.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rancher | >=2.0.0<=2.1.5 | |
go/github.com/rancher/rancher | >=2.0.0<=2.1.5 | 2.1.6 |
>=2.0.0<=2.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6287 is a vulnerability in Rancher 2.0.0 through 2.1.5 that allows project members to retain access to create, update, read, and delete namespaces in a project even after being removed from it.
CVE-2019-6287 has a severity rating of 8.1 (high).
Rancher versions 2.0.0 through 2.1.5 are affected by CVE-2019-6287.
To fix CVE-2019-6287, upgrade to Rancher version 2.1.6 or 2.0.11 or later.
More information about CVE-2019-6287 can be found on the Rancher forums (https://forums.rancher.com/c/announcements) and the Rancher blog (https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11/).