CWE
295
Advisory Published
Updated

GHSA-xgpc-q899-67p8

First published: Fri Apr 25 2025(Updated: )

### Impact A vulnerability has been identified within Fleet where, by default, Fleet will automatically trust a remote server’s certificate when connecting through SSH if the certificate isn’t set in the `known_hosts` file. This could allow the execution of a man-in-the-middle (MitM) attack against Fleet. In case the server that is being connected to has a trusted entry in the known_hosts file, then Fleet will correctly check the authenticity of the presented certificate. Please consult the associated [MITRE ATT&CK - Technique - Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557/) for further information about this category of attack. ### Patches Patched versions include releases `v0.10.12`, `v0.11.7` and `v0.12.2`. The fix involves some key areas with the following changes: - Git latest commit fetcher sources `known_hosts` entries from the following locations, in decreasing order of priority: 1. Secret referenced in a `GitRepo`’s `clientSecretName` field; 2. If no secret is referenced, in a `gitcredential` secret located in the `GitRepo`’s namespace; 3. If that secret does not exist, in a (new) `known-hosts` config map installed by Fleet, populated statically with public entries shared by a few git providers: Github, Gitlab, Bitbucket, Azure DevOps; - Git cloner: same as above. - `fleet apply` command: same as above. The command reads entries from a `FLEET_KNOWN_HOSTS` environment variable. That command is typically run within a container inside a job pod created by Fleet to update bundles from a new commit. However, users may also decide to run it locally, perhaps even with multiple concurrent executions of the command on the same machine. To cater for this, `fleet apply` writes the contents of `FLEET_KNOWN_HOSTS`, if any, to a temporary file with a random name, and deletes that file once bundles have been created. This reduces the risk of conflicts between concurrent runs. This happens regardless of the git repository URL (SSH or not), since a repository may reference artifacts to be retrieved using SSH anyway. **Note about sourcing `known_hosts` entries:** if entries are found in a supported source, whatever that source may be, then those entries will be used. For instance, if wrong entries, or an incomplete set of entries (e.g. only BitBucket entries for a `GitRepo` pointing to Github) are found in a secret referenced in a `GitRepo`’s `clientSecretName` field, they will still be used. This will lead to errors if strict host key checks are enabled, even if matching, correct entries are found in another source with lower priority, such as the `known-hosts` config map. Fleet will not use one source to complement the other. **Note: Fleet v0.9 release line does not have the fix for this CVE. The fix for v0.9 was considered too complex and with the risk of introducing instabilities right before this version goes into end-of-life (EOL), as documented in [SUSE’s Product Support Lifecycle](https://www.suse.com/lifecycle/#suse-rancher-prime) page. Please see the section below for workarounds or consider upgrading to a newer and patched version of Rancher.** ### Workarounds There are no workarounds for this issue. Users are recommended to upgrade, as soon as possible, to a version of Fleet that contains the fixes. ### References If you have any questions or comments about this advisory: - Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).

Affected SoftwareAffected VersionHow to fix
go/github.com/rancher/fleet>=0.12.0<0.12.2
0.12.2
go/github.com/rancher/fleet>=0.11.0<0.11.7
0.11.7
go/github.com/rancher/fleet>=0.9.0-rc.1<0.10.12
0.10.12

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of GHSA-xgpc-q899-67p8?

    The vulnerability GHSA-xgpc-q899-67p8 has a moderate severity level.

  • How do I fix GHSA-xgpc-q899-67p8?

    To fix GHSA-xgpc-q899-67p8, upgrade Fleet to version 0.12.2, 0.11.7, or 0.10.12.

  • What software versions are affected by GHSA-xgpc-q899-67p8?

    Versions of Fleet from 0.10.0 to 0.12.2 and from 0.11.0 to 0.11.7 are affected by GHSA-xgpc-q899-67p8.

  • What type of attack can exploit GHSA-xgpc-q899-67p8?

    GHSA-xgpc-q899-67p8 is vulnerable to man-in-the-middle (MitM) attacks when SSH connections are made.

  • What does GHSA-xgpc-q899-67p8 affect within Fleet?

    GHSA-xgpc-q899-67p8 affects the default behavior of Fleet's SSH certificate handling.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203