Credential Exposure Affecting github.com/rancher/rancher/pkg/rancher package, versions >=2.7.0 <2.7.14 >=2.8.0 <2.8.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGRANCHER-7267991
  • published 19 Jun 2024
  • disclosed 17 Jun 2024
  • credit Unknown

How to fix?

Upgrade github.com/rancher/rancher/pkg/rancher to version 2.7.14, 2.8.5 or higher.

Overview

github.com/rancher/rancher/pkg/rancher is a complete container management platform

Affected versions of this package are vulnerable to Credential Exposure in the form of Kube API secret values being written in the cluster AppliedSpec. The cluster must be provisioned with RKE1 and have secrets encryption configuration enabled. Low-privilege roles including Cluster owner, Cluster member, and Project member all have access to these configs, where the secret is stored in plaintext.

Note: After upgrading, keys must be manually rotated by editing the cluster to clear the affected value.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    Low
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None