
CVE-2021-36775 – Deleting PRTBs associated to a group doesn't cause deletion of corresponding RoleBindings
https://notcve.org/view.php?id=CVE-2021-36775
01 Apr 2022 — a Improper Access Control vulnerability in SUSE Rancher allows users to keep privileges that should have been revoked. This issue affects: SUSE Rancher Rancher versions prior to 2.4.18; Rancher versions prior to 2.5.12; Rancher versions prior to 2.6.3. Una vulnerabilidad de Control de Acceso Inapropiado en SUSE Rancher permite a usuarios mantener privilegios que deberían haber sido revocados. Este problema afecta a: SUSE Rancher versiones anteriores a 2.4.18; versiones de Rancher anteriores a 2.5.12; versio... • https://bugzilla.suse.com/show_bug.cgi?id=1189120 • CWE-284: Improper Access Control •

CVE-2021-31999 – Rancher: Privilege escalation vulnerability via malicious Connection header
https://notcve.org/view.php?id=CVE-2021-31999
15 Jul 2021 — A Reliance on Untrusted Inputs in a Security Decision vulnerability in Rancher allows users in the cluster to act as others users in the cluster by forging the "Impersonate-User" or "Impersonate-Group" headers. This issue affects: Rancher versions prior to 2.5.9. Rancher versions prior to 2.4.16. Una vulnerabilidad de Dependencia de Datos no Confiables en una Decisión de Seguridad en Rancher permite a usuarios del cluster actuar como otros usuarios del cluster al falsificar los encabezados "Impersonate-User... • https://bugzilla.suse.com/show_bug.cgi?id=1187084 • CWE-807: Reliance on Untrusted Inputs in a Security Decision •

CVE-2021-25320 – Rancher: Cloud credentials can be used through proxy API by users without access
https://notcve.org/view.php?id=CVE-2021-25320
15 Jul 2021 — A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16. Una vulnerabilidad de Control de Acceso Inapropiado en Rancher, permite a usuarios del cluster hacer peticiones a los proveedores de la nube al crear peticiones con el ID de la... • https://bugzilla.suse.com/show_bug.cgi?id=1185514 • CWE-284: Improper Access Control •

CVE-2021-25318 – rancher: API group not properly specified when creating Kubernetes RBAC resources
https://notcve.org/view.php?id=CVE-2021-25318
15 Jul 2021 — A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to. This issue affects: Rancher versions prior to 2.5.9 ; Rancher versions prior to 2.4.16. Una vulnerabilidad de Asignación Incorrecta de Permisos para Recursos Críticos en Rancher permite a usuarios del clúster modificar recursos a los que no deberían tener acceso. Este problema afecta a: Rancher versiones anteriores a 2.5.9; Rancher versiones anterio... • https://bugzilla.suse.com/show_bug.cgi?id=1184913 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2021-25313 – Rancher: XSS on /v3/cluster/
https://notcve.org/view.php?id=CVE-2021-25313
05 Mar 2021 — A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6. Una vulnerabilidad de Neutralización Inapropiada de la Entrada Durante la Generación de Páginas Web ("Cross-site Scripting") en Rancher, permite a atacantes remotos ejecutar JavaScript por medio de enlaces maliciosos. Este problema afecta a: SUSE Rancher Rancher... • https://bugzilla.suse.com/show_bug.cgi?id=1181852 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-13209
https://notcve.org/view.php?id=CVE-2019-13209
04 Sep 2019 — Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim. Rancher versiones 2 hasta 2.2.4, es vulnerable a un ataque de tipo Cross-Sit... • https://forums.rancher.com/c/announcements • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-11202
https://notcve.org/view.php?id=CVE-2019-11202
30 Jul 2019 — An issue was discovered that affects the following versions of Rancher: v2.0.0 through v2.0.13, v2.1.0 through v2.1.8, and v2.2.0 through 2.2.1. When Rancher starts for the first time, it creates a default admin user with a well-known password. After initial setup, the Rancher administrator may choose to delete this default admin user. If Rancher is restarted, the default admin user will be recreated with the well-known default password. An attacker could exploit this by logging in with the default admin cr... • https://forums.rancher.com/c/announcements • CWE-287: Improper Authentication •

CVE-2019-11881
https://notcve.org/view.php?id=CVE-2019-11881
10 Jun 2019 — A vulnerability exists in Rancher 2.1.4 in the login component, where the errorMsg parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There's no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a "This version of Rancher is outdated, please visit https://malicious.rancher.site/upgrading" message. Existe una vulnerabilidad Rancher 2.1.4 en el componente de ... • https://github.com/MauroEldritch/VanCleef •

CVE-2019-12274
https://notcve.org/view.php?id=CVE-2019-12274
06 Jun 2019 — In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml. En Rancher versión 1 y versión 2 hasta 2.2.3, usuarios sin privilegios (si se les permite desplegar nodos) pueden obtener acceso de adm... • https://forums.rancher.com/c/announcements • CWE-668: Exposure of Resource to Wrong Sphere CWE-862: Missing Authorization •

CVE-2019-12303
https://notcve.org/view.php?id=CVE-2019-12303
06 Jun 2019 — In Rancher 2 through 2.2.3, Project owners can inject additional fluentd configuration to read files or execute arbitrary commands inside the fluentd container. En Rancher versión 2 hasta 2.2.3, los propietarios del proyecto pueden inyectar una configuración fluentd adicional para leer archivos o ejecutar comandos arbitrarios dentro del contenedor fluentd. • https://forums.rancher.com/c/announcements • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •