Access Control Bypass Affecting github.com/rancher/rancher/pkg/controllers/management/secretmigrator package, versions >=2.5.0 <2.5.17>=2.6.0 <2.6.10>=2.7.0 <2.7.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGCONTROLLERSMANAGEMENTSECRETMIGRATOR-3248484
  • published26 Jan 2023
  • disclosed25 Jan 2023
  • creditUnknown

Introduced: 25 Jan 2023

CVE-2022-21953  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade github.com/rancher/rancher/pkg/controllers/management/secretmigrator to version 2.5.17, 2.6.10, 2.7.1 or higher.

Overview

Affected versions of this package are vulnerable to Access Control Bypass. Authenticated user can gain unauthorized shell pod and kubectl access in the local cluster. An authorization logic flaw allows an authenticated user on any downstream cluster to (1) open a shell pod in the Rancher local cluster and (2) have limited kubectl access to it. The expected behavior is that a user does not have such access in the Rancher local cluster unless explicitly granted.

Note: This issue does not allow the user to directly escalate privileges in the local cluster (this would require another vulnerability to be exploited).

References

CVSS Base Scores

version 3.1