QID 983810

QID 983810: Go (go) Security Update for github.com/rancher/rancher (GHSA-9qq2-xhmc-h9qr)

An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a separate project, where only cluster admins can be given permissions to access. As of 2018-12-20, this bug affected ALL clusters created or imported by Rancher.

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Customers are advised to refer to GHSA-9qq2-xhmc-h9qr for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 983810

    Software Advisories
    Advisory ID Software Component Link
    GHSA-9qq2-xhmc-h9qr github.com/rancher/rancher URL Logo github.com/advisories/GHSA-9qq2-xhmc-h9qr