← Voltar para CVEs
CVE-2023-22647
CRITICAL9.9
Descricao
An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.
Detalhes CVE
Pontuacao CVSS v3.19.9
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado6/1/2023
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
suse:rancher
Fraquezas (CWE)
CWE-267
Referencias
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647(meissner@suse.de)
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rancher/rancher/security/advisories/GHSA-p976-h52c-26p6(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.