The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/rancher/rancher/pkg/auth/requests
to version 2.4.16, 2.5.9 or higher.
Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the Connection
header. An attacker can gain unauthorized access to information by crafting an API request with the Impersonate-User
or Impersonate-Group
header included in the Connection
header, which is then correctly removed by the proxy. This allows the request to act as if it was from the Rancher management server, thus bypassing intended access controls.
Note:
This is only exploitable if the attacker is a valid Rancher user with some level of permissions on the cluster.