Reliance on Untrusted Inputs in a Security Decision Affecting github.com/rancher/rancher/pkg/auth/requests package, versions >=2.0.0 <2.4.16>=2.5.0 <2.5.9


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGAUTHREQUESTS-6673741
  • published25 Apr 2024
  • disclosed24 Apr 2024
  • creditUnknown

Introduced: 24 Apr 2024

CVE-2021-31999  (opens in a new tab)
CWE-807  (opens in a new tab)

How to fix?

Upgrade github.com/rancher/rancher/pkg/auth/requests to version 2.4.16, 2.5.9 or higher.

Overview

Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the Connection header. An attacker can gain unauthorized access to information by crafting an API request with the Impersonate-User or Impersonate-Group header included in the Connection header, which is then correctly removed by the proxy. This allows the request to act as if it was from the Rancher management server, thus bypassing intended access controls.

Note:

This is only exploitable if the attacker is a valid Rancher user with some level of permissions on the cluster.

CVSS Scores

version 3.1