← Retour aux CVEs
CVE-2023-22647
CRITICAL9.9
Description
An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
Details CVE
Score CVSS v3.19.9
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie6/1/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
suse:rancher
Faiblesses (CWE)
CWE-267
References
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647(meissner@suse.de)
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rancher/rancher/security/advisories/GHSA-p976-h52c-26p6(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.