CVE-2023-22651

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-22651
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22651.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-22651
Aliases
Published
2023-05-04T08:15:22Z
Modified
2024-06-06T14:17:32.555096Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security checks before resources are admitted into the Kubernetes cluster. The issue only affects users that upgrade from 2.6.x or 2.7.x to 2.7.2. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.

References

Affected packages

Git / github.com/rancher/rancher

Affected ranges

Type
GIT
Repo
https://github.com/rancher/rancher
Events

Affected versions

v2.*

v2.6.0
v2.6.0-rc10
v2.6.1
v2.6.1-harvester1
v2.6.1-harvester2
v2.6.1-rc1
v2.6.1-rc10
v2.6.1-rc11
v2.6.1-rc12
v2.6.1-rc13
v2.6.1-rc2
v2.6.1-rc3
v2.6.1-rc4
v2.6.1-rc5
v2.6.1-rc6
v2.6.1-rc7
v2.6.1-rc8
v2.6.1-rc9
v2.6.3
v2.6.3-harvester1
v2.6.3-rc1
v2.6.3-rc10
v2.6.3-rc11
v2.6.3-rc2
v2.6.3-rc3
v2.6.3-rc4
v2.6.3-rc5
v2.6.3-rc6
v2.6.3-rc7
v2.6.3-rc8
v2.6.3-rc9
v2.6.4-alpha1
v2.6.4-alpha2
v2.6.4-alpha3
v2.6.4-rc1
v2.6.4-rc10
v2.6.4-rc11
v2.6.4-rc12
v2.6.4-rc13
v2.6.4-rc2
v2.6.4-rc3
v2.6.4-rc4
v2.6.4-rc5
v2.6.4-rc6
v2.6.4-rc8
v2.6.4-rc9
v2.6.5
v2.6.5-alpha1
v2.6.5-rc1
v2.6.5-rc10
v2.6.5-rc11
v2.6.5-rc12
v2.6.5-rc2
v2.6.5-rc3
v2.6.5-rc4
v2.6.5-rc5
v2.6.5-rc6
v2.6.5-rc8
v2.6.5-rc9
v2.6.6-rc1
v2.6.7
v2.6.7-rc1
v2.6.7-rc10
v2.6.7-rc2
v2.6.7-rc3
v2.6.7-rc4
v2.6.7-rc5
v2.6.7-rc6
v2.6.7-rc7
v2.6.7-rc8
v2.6.7-rc9
v2.6.8
v2.6.8-rc1
v2.6.8-rc2
v2.6.8-rc3
v2.6.8-rc4
v2.7.0
v2.7.0-novkdm
v2.7.0-rc1
v2.7.0-rc10
v2.7.0-rc11
v2.7.0-rc12
v2.7.0-rc2
v2.7.0-rc3
v2.7.0-rc4
v2.7.0-rc5
v2.7.0-rc6
v2.7.0-rc7
v2.7.0-rc8
v2.7.0-rc9
v2.7.2
v2.7.2-rc1
v2.7.2-rc10
v2.7.2-rc2
v2.7.2-rc3
v2.7.2-rc4
v2.7.2-rc5
v2.7.2-rc6
v2.7.2-rc7
v2.7.2-rc8
v2.7.2-rc9