First published: Thu Jun 01 2023(Updated: )
An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
Credit: meissner@suse.de meissner@suse.de meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
go/rancher/rancher | >=2.7.0<2.7.4 | 2.7.4 |
go/rancher/rancher | >=2.6.0<2.6.13 | 2.6.13 |
SUSE Rancher | >=2.6.0<2.6.13 | |
SUSE Rancher | >=2.7.0<2.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability allows standard users or above to elevate their permissions and perform actions they should not be able to.
SUSE Rancher versions 2.6.0 through 2.6.13 and 2.7.0 through 2.7.4 are affected.
Upgrade to SUSE Rancher version 2.7.4 if you are using version 2.7.0 through 2.7.3, or upgrade to version 2.6.13 if you are using version 2.6.0 through 2.6.12.
The severity of CVE-2023-22647 is critical, with a CVSS score of 9.9.
The CWE ID for CVE-2023-22647 is CWE-269.