Access Restriction Bypass Affecting github.com/rancher/rancher/pkg/controllers/management/auth package, versions >=2.5.0 <2.5.17>=2.6.0 <2.6.10>=2.7.0 <2.7.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGCONTROLLERSMANAGEMENTAUTH-3248760
  • published26 Jan 2023
  • disclosed25 Jan 2023
  • creditUnknown

Introduced: 25 Jan 2023

CVE NOT AVAILABLE CWE-287  (opens in a new tab)

How to fix?

Upgrade github.com/rancher/rancher/pkg/controllers/management/auth to version 2.5.17, 2.6.10, 2.7.1 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass because generated tokens are not revoked after modifications are made to an authentication provider.

It only affects Rancher setups that have an external authentication provider configured or had one configured in the past. When an external authentication provider is configured in Rancher and then disabled, the Rancher generated tokens associated with users who had access granted through the now disabled auth provider are not revoked. This allows users to retain access to Rancher and kubectl access to clusters managed by Rancher, according to their previously configured permissions, even after they are supposed to have lost it due to the auth provider being disabled.

References

CVSS Scores

version 3.1