First published: Fri Aug 19 2022(Updated: )
A Insufficiently Protected Credentials vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners and Project Members to read credentials, passwords and API tokens that have been stored in cleartext and exposed via API endpoints. This issue affects: SUSE Rancher Rancher versions prior to 2.6.4; Rancher versions prior to 2.5.13.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rancher | >=2.5.0<2.5.13 | |
SUSE Rancher | >=2.6.0<2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36783 is a vulnerability in SUSE Rancher that allows authenticated users to read credentials, passwords, and API tokens stored in cleartext.
Authenticated Cluster Owners, Cluster Members, Project Owners, and Project Members are affected by CVE-2021-36783.
CVE-2021-36783 has a severity rating of 9.9 out of 10.
To fix CVE-2021-36783, update SUSE Rancher to version 2.5.14 or 2.6.5 or later.
You can find more information about CVE-2021-36783 at the following references: - [Bugzilla](https://bugzilla.suse.com/show_bug.cgi?id=1193990) - [GitHub Security Advisory](https://github.com/rancher/rancher/security/advisories/GHSA-8w87-58w6-hfv8)