Github.Com Rancher Rancher vulnerabilities

55 known vulnerabilities affecting github.com/rancher_rancher.

Total CVEs
55
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL12HIGH30MEDIUM13

Vulnerabilities

Page 3 of 3
CVE-2022-43758MEDIUM≥ 2.5.0, < 2.5.17≥ 2.6.0, < 2.6.10+1 more2023-01-25
CVE-2022-43758 [MEDIUM] CWE-77 Command injection in Rancher Git package Command injection in Rancher Git package ### Impact An issue was discovered in Rancher from versions 2.5.0 up to and including 2.5.16, 2.6.0 up to and including 2.6.9 and 2.7.0, where a command injection vulnerability is present in the Rancher Git package. This package uses the underlying Git binary available in the Rancher container image to execute Git operations. Specially crafted commands, when not properly disambigua
ghsaosv
CVE-2021-36782CRITICAL≥ 2.5.0, < 2.5.16≥ 2.6.0, < 2.6.72022-09-23
CVE-2021-36782 [CRITICAL] CWE-312 Rancher API and cluster.management.cattle.io object vulnerable to plaintext storage and exposure of credentials Rancher API and cluster.management.cattle.io object vulnerable to plaintext storage and exposure of credentials ### Impact An issue was discovered in Rancher versions up to and including 2.5.15 and 2.6.6 where sensitive fields, like passwords, API keys and Rancher's service account token (used to provision clusters), were stored in plaintext directly
ghsaosv
CVE-2019-11202CRITICAL≥ 2.0.0, ≤ 2.0.13≥ 2.1.0, ≤ 2.1.8+1 more2022-05-24
CVE-2019-11202 [CRITICAL] CWE-287 Rancher Recreates Default User With Known Password Despite Deletion Rancher Recreates Default User With Known Password Despite Deletion An issue was discovered that affects the following versions of Rancher: v2.0.0 through v2.0.13, v2.1.0 through v2.1.8, and v2.2.0 through 2.2.1. When Rancher starts for the first time, it creates a default admin user with a well-known password. After initial setup, the Rancher administrator may choose to delete this default adm
ghsaosv
CVE-2019-12274HIGH≥ 2.0.0, < 2.2.4≥ 0, < 1.6.272022-05-24
CVE-2019-12274 [HIGH] CWE-668 Rancher Privilege Escalation Vulnerability Rancher Privilege Escalation Vulnerability In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
ghsaosv
CVE-2019-12303HIGH≥ 2.0.0, < 2.2.42022-05-24
CVE-2019-12303 [HIGH] CWE-74 Rancher code injection via fluentd config commands Rancher code injection via fluentd config commands In Rancher 2 through 2.2.3, Project owners can inject additional fluentd configuration to read files or execute arbitrary commands inside the fluentd container.
ghsaosv
CVE-2021-25313MEDIUM≥ 2.5.0, < 2.5.6≥ 2.4.0, < 2.4.14+1 more2022-05-24
CVE-2021-25313 [MEDIUM] CWE-79 Rancher Cross-site Scripting Vulnerability Rancher Cross-site Scripting Vulnerability A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6.
ghsaosv
CVE-2019-11881MEDIUM≥ 0, ≤ 2.1.42022-05-24
CVE-2019-11881 [MEDIUM] Rancher Login Parameter Can Be Edited Rancher Login Parameter Can Be Edited A vulnerability exists in Rancher 2.1.4 in the login component, where the `errorMsg` parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There's no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a "This version of Rancher is outdated, please vi
ghsaosv
CVE-2017-7297HIGH≥ 1.5.0, < 1.5.3≥ 1.4.0, < 1.4.3+2 more2022-05-13
CVE-2017-7297 [HIGH] Rancher Access Control Vulnerability Rancher Access Control Vulnerability Rancher Labs rancher server 1.2.0+ is vulnerable to authenticated users disabling access control via an API call. This is fixed in versions rancher/server:v1.2.4, rancher/server:v1.3.5, rancher/server:v1.4.3, and rancher/server:v1.5.3.
ghsaosv
CVE-2019-6287HIGH≥ 2.0.0, < 2.1.62022-05-13
CVE-2019-6287 [HIGH] CWE-269 Rancher Project Members Have Continued Access to Namespaces After Being Removed From Them Rancher Project Members Have Continued Access to Namespaces After Being Removed From Them In Rancher 2.0.0 through 2.1.5, project members have continued access to create, update, read, and delete namespaces in a project after they have been removed from it.
ghsaosv
CVE-2021-4200HIGH≥ 2.6.0, < 2.6.4≥ 2.5.0, < 2.5.132022-05-02
CVE-2021-4200 [HIGH] CWE-269 Write access to the catalog for any user when restricted-admin role is enabled in Rancher Write access to the catalog for any user when restricted-admin role is enabled in Rancher ### Impact This vulnerability only affects customers using the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin) role in Rancher. For this role to be active, Rancher must be bootstrapped with the environment variable `C
ghsaosv
CVE-2021-36778HIGH≥ 2.6.0, < 2.6.3≥ 2.5.0, < 2.5.122022-05-02
CVE-2021-36778 [HIGH] CWE-200 Exposure of repository credentials to external third-party sources in Rancher Exposure of repository credentials to external third-party sources in Rancher ### Impact This issue only happens when the user configures access credentials to a private repository in Rancher inside `Apps & Marketplace > Repositories`. It affects Rancher versions 2.5.0 up to and including 2.5.11 and from 2.6.0 up to and including 2.6.2. An insufficient check of the same-origin policy whe
ghsaosv
CVE-2021-36784MEDIUM≥ 2.6.0, < 2.6.4≥ 2.5.0, < 2.5.132022-05-02
CVE-2021-36784 [MEDIUM] CWE-269 Privilege escalation for users with create/update permissions in Global Roles in Rancher Privilege escalation for users with create/update permissions in Global Roles in Rancher ### Impact This vulnerability affects customers who utilize non-admin users that are able to create or edit [Global Roles](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/). The most common use case for this scenario is the [`restricted-admin`](https://rancher.com/docs/ranche
ghsaosv
CVE-2022-29810MEDIUMCVSS 5.5≥ 0, < 2.5.13≥ 2.6.0, < 2.6.42022-04-27
CVE-2022-29810 [MEDIUM] CWE-200 Exposure of SSH credentials in Rancher/Fleet Exposure of SSH credentials in Rancher/Fleet ### Impact This vulnerability only affects customers using Fleet for continuous delivery with authenticated Git and/or Helm repositories. A security vulnerability ([CVE-2022-29810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29810)) was discovered in `go-getter` library in versions prior to [`v1.5.11`](https://github.com/hashicorp/go-getter/releases/tag/v1.5.11)
ghsaosv
CVE-2018-20321MEDIUM≥ 2.0.0, < 2.1.62021-06-23
CVE-2018-20321 [MEDIUM] CWE-288 Access Control Bypass Access Control Bypass An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a separate project, where only cluster admins can be given permissions to access. As of 2018-12-20, this b
ghsaosv
CVE-2019-13209HIGH≥ 2.0.0, < 2.0.16≥ 2.1.0, < 2.1.11+1 more2021-05-18
CVE-2019-13209 [HIGH] CWE-352 Rancher Vulnerable to Cross-site Request Forgery (CSRF) Rancher Vulnerable to Cross-site Request Forgery (CSRF) Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against
ghsaosv