QID 983810
QID 983810: Go (go) Security Update for github.com/rancher/rancher (GHSA-9qq2-xhmc-h9qr)
An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a separate project, where only cluster admins can be given permissions to access. As of 2018-12-20, this bug affected ALL clusters created or imported by Rancher.
Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.
Solution
Customers are advised to refer to GHSA-9qq2-xhmc-h9qr for updates pertaining to this vulnerability.
Vendor References
- GHSA-9qq2-xhmc-h9qr -
github.com/advisories/GHSA-9qq2-xhmc-h9qr
CVEs related to QID 983810
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-9qq2-xhmc-h9qr | github.com/rancher/rancher |
|