The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Privilege Assignment vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/rancher/rancher/pkg/apis/management.cattle.io/v3
to version 2.7.14, 2.8.5 or higher.
github.com/rancher/rancher/pkg/apis/management.cattle.io/v3 is a complete container management platform
Affected versions of this package are vulnerable to Incorrect Privilege Assignment when enforcing the privileges of a the RoleTemplate
object with external
set to true
. For such objects, when the ClusterRole
is set to project
or is empty, an attacker can escalate privileges.
The package maintainers have provided a script for users to identify and correct RoleTemplate
s with a missing externalRules
field and no backing ClusterRole
.
#!/bin/bash set -euo pipefail
get all RoleTemplates with .context == "project" or .context == "" that don't have externalRules.
rts=$(kubectl get roletemplates -o json | jq -r '.items[] | select((.context == "project" or .context == "") and .external == true and .externalRules == null) | .metadata.name') found_invalid_rt=false
for rt in $rts; do if ! kubectl get clusterrole "$rt" > /dev/null 2>&1; then echo "$rt" # prints RoleTemplate names that don't have a backing ClusterRole found_invalid_rt=true fi done
if ! $found_invalid_rt ; then echo 'This cluster is not affected by CVE-2023-32197: no RoleTemplate objects found' fi