GHSA-xhg2-rvm8-w2jh

Suggest an improvement
Source
https://github.com/advisories/GHSA-xhg2-rvm8-w2jh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-xhg2-rvm8-w2jh/GHSA-xhg2-rvm8-w2jh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xhg2-rvm8-w2jh
Aliases
Published
2021-05-18T15:42:40Z
Modified
2023-11-08T04:01:07.844132Z
Severity
  • CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:H
Summary
Rancher Vulnerable to Cross-site Request Forgery (CSRF)
Details

Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim.

References

Affected packages

Go / github.com/rancher/rancher

Package

Name
github.com/rancher/rancher
Purl
pkg:golang/github.com/rancher/rancher

Affected ranges

Type
SEMVER
Events
Introduced
2.0.0
Fixed
2.0.16

Go / github.com/rancher/rancher

Package

Name
github.com/rancher/rancher
Purl
pkg:golang/github.com/rancher/rancher

Affected ranges

Type
SEMVER
Events
Introduced
2.1.0
Fixed
2.1.11

Go / github.com/rancher/rancher

Package

Name
github.com/rancher/rancher
Purl
pkg:golang/github.com/rancher/rancher

Affected ranges

Type
SEMVER
Events
Introduced
2.2.0
Fixed
2.2.5