CVE-2023-22647Privilege Defined With Unsafe Actions in Rancher

Severity
8.0HIGHNVD
CNA9.9
EPSS
0.8%
top 26.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 1
Latest updateJun 6

Description

An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster. This issue affects Rancher: from >= 2

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages3 packages

CVEListV5suse/rancher>= 2.6.0< 2.6.13+1
NVDsuse/rancher2.6.02.6.13+1
Gogithub.com/rancher_rancher2.6.02.6.13+1

🔴Vulnerability Details

3
OSV
Rancher vulnerable to Privilege Escalation via manipulation of Secrets2023-06-06
GHSA
Rancher vulnerable to Privilege Escalation via manipulation of Secrets2023-06-06
CVEList
CVE-2023-22647: An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes2023-06-01
CVE-2023-22647 — Privilege Defined With Unsafe Actions | cvebase