Reliance on Untrusted Inputs in a Security Decision Affecting github.com/rancher/rancher/pkg/multiclustermanager package, versions >=2.0.0 <2.4.16 >=2.5.0 <2.5.9


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.09% (37th percentile)
Expand this section
NVD
8.8 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGMULTICLUSTERMANAGER-6673742
  • published 25 Apr 2024
  • disclosed 24 Apr 2024
  • credit Unknown

How to fix?

Upgrade github.com/rancher/rancher/pkg/multiclustermanager to version 2.4.16, 2.5.9 or higher.

Overview

Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the Connection header. An attacker can gain unauthorized access to information by crafting an API request with the Impersonate-User or Impersonate-Group header included in the Connection header, which is then correctly removed by the proxy. This allows the request to act as if it was from the Rancher management server, thus bypassing intended access controls.

Note:

This is only exploitable if the attacker is a valid Rancher user with some level of permissions on the cluster.