CWE
266
Advisory Published
Updated

GHSA-8p83-cpfg-fj3g

First published: Tue Apr 01 2025(Updated: )

### Impact A vulnerability has been identified within Rancher where a Restricted Administrator can change the password of Administrators and take over their accounts. A Restricted Administrator should be not allowed to change the password of more privileged users unless it contains the Manage Users permissions. Rancher deployments where the Restricted Administrator role is not being used are not affected by this CVE. Please consult the associated [MITRE ATT&CK - Technique - Abuse Elevation Control Mechanism](https://attack.mitre.org/techniques/T1548/) for further information about this category of attack. ### Patches The fix introduces a few changes: 1. If the user has a manage-users verb, the user is allowed to edit/delete users. That way the Manage Users built in role will still be able to edit ALL users. 2. If the user doesn't have manage-users, just edit or delete, then there is a check to ensure that the User being edited only has rules equal to or less than the editor. Patched versions include releases `v2.8.14`, `v2.9.8`, `v2.10.4` and `v2.11.0` ### Workarounds Users are recommended to upgrade, as soon as possible, to a version of Rancher Manager that contains the fix. If users can't upgrade, the following are recommended: 1. Limit access to Rancher Restricted Admin only to trusted users. 2. Downgrade Restricted Administrators to custom roles with limited permissions. ### References If you have any questions or comments about this advisory: - Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).

Affected SoftwareAffected VersionHow to fix
go/github.com/rancher/rancher>=2.10.0<2.10.4
2.10.4
go/github.com/rancher/rancher>=2.9.0<2.9.8
2.9.8
go/github.com/rancher/rancher>=2.8.0<2.8.14
2.8.14

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of GHSA-8p83-cpfg-fj3g?

    The severity of GHSA-8p83-cpfg-fj3g is classified as a high risk as it allows Restricted Administrators to take over Administrator accounts.

  • How do I fix GHSA-8p83-cpfg-fj3g?

    To fix GHSA-8p83-cpfg-fj3g, upgrade your Rancher version to 2.10.4, 2.9.8, or 2.8.14.

  • Who is affected by GHSA-8p83-cpfg-fj3g?

    Users running vulnerable versions of Rancher, specifically versions from 2.10.0 to 2.10.4, 2.9.0 to 2.9.8, and 2.8.0 to 2.8.14, are affected by GHSA-8p83-cpfg-fj3g.

  • What does GHSA-8p83-cpfg-fj3g allow Restricted Administrators to do?

    GHSA-8p83-cpfg-fj3g allows Restricted Administrators to change the passwords of higher-privileged Administrator accounts.

  • Is there any other impact of GHSA-8p83-cpfg-fj3g besides account takeover?

    The primary impact of GHSA-8p83-cpfg-fj3g is account takeover, and no additional impacts have been specified.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203