Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim.
{ "nvd_published_at": "2019-09-04T14:15:00Z", "cwe_ids": [ "CWE-352", "CWE-79" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-05-17T16:37:55Z" }