Access Restriction Bypass Affecting github.com/rancher/rancher/pkg/controllers/management/auth package, versions >=2.5.0 <2.5.17 >=2.6.0 <2.6.10 >=2.7.0 <2.7.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGCONTROLLERSMANAGEMENTAUTH-3248760
  • published 26 Jan 2023
  • disclosed 25 Jan 2023
  • credit Unknown

Introduced: 25 Jan 2023

CVE NOT AVAILABLE CWE-287 Open this link in a new tab

How to fix?

Upgrade github.com/rancher/rancher/pkg/controllers/management/auth to version 2.5.17, 2.6.10, 2.7.1 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass because generated tokens are not revoked after modifications are made to an authentication provider.

It only affects Rancher setups that have an external authentication provider configured or had one configured in the past. When an external authentication provider is configured in Rancher and then disabled, the Rancher generated tokens associated with users who had access granted through the now disabled auth provider are not revoked. This allows users to retain access to Rancher and kubectl access to clusters managed by Rancher, according to their previously configured permissions, even after they are supposed to have lost it due to the auth provider being disabled.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.8 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High