Reliance on Untrusted Inputs in a Security Decision Affecting github.com/rancher/rancher/pkg/multiclustermanager package, versions >=2.0.0 <2.4.16 >=2.5.0 <2.5.9


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGMULTICLUSTERMANAGER-6673742
  • published 25 Apr 2024
  • disclosed 24 Apr 2024
  • credit Unknown

How to fix?

Upgrade github.com/rancher/rancher/pkg/multiclustermanager to version 2.4.16, 2.5.9 or higher.

Overview

Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the Connection header. An attacker can gain unauthorized access to information by crafting an API request with the Impersonate-User or Impersonate-Group header included in the Connection header, which is then correctly removed by the proxy. This allows the request to act as if it was from the Rancher management server, thus bypassing intended access controls.

Note:

This is only exploitable if the attacker is a valid Rancher user with some level of permissions on the cluster.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.8 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

8.8 high