Credential Exposure Affecting github.com/rancher/rancher/pkg/rancher package, versions >=2.7.0 <2.7.14>=2.8.0 <2.8.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGRANCHER-7267991
  • published19 Jun 2024
  • disclosed17 Jun 2024
  • creditUnknown

Introduced: 17 Jun 2024

CVE-2024-22032  (opens in a new tab)
CWE-256  (opens in a new tab)

How to fix?

Upgrade github.com/rancher/rancher/pkg/rancher to version 2.7.14, 2.8.5 or higher.

Overview

github.com/rancher/rancher/pkg/rancher is a complete container management platform

Affected versions of this package are vulnerable to Credential Exposure in the form of Kube API secret values being written in the cluster AppliedSpec. The cluster must be provisioned with RKE1 and have secrets encryption configuration enabled. Low-privilege roles including Cluster owner, Cluster member, and Project member all have access to these configs, where the secret is stored in plaintext.

Note: After upgrading, keys must be manually rotated by editing the cluster to clear the affected value.

CVSS Scores

version 4.0
version 3.1