Exploit maturity not defined.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Access Restriction Bypass vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/rancher/rancher/pkg/controllers/management/auth
to version 2.5.17, 2.6.10, 2.7.1 or higher.
Affected versions of this package are vulnerable to Access Restriction Bypass because generated tokens are not revoked after modifications are made to an authentication provider.
It only affects Rancher setups that have an external authentication provider configured or had one configured in the past.
When an external authentication provider is configured in Rancher and then disabled, the Rancher generated tokens associated with users who had access granted through the now disabled auth provider are not revoked. This allows users to retain access to Rancher and kubectl
access to clusters managed by Rancher, according to their previously configured permissions, even after they are supposed to have lost it due to the auth provider being disabled.