Rancher Privilege Escalation Vulnerability
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Aug 1, 2023
Package
Affected versions
>= 2.0.0, < 2.2.4
< 1.6.27
Patched versions
2.2.4
1.6.27
Description
Published by the National Vulnerability Database
Jun 6, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Aug 1, 2023
Last updated
Aug 1, 2023
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
References