
CVE-2024-22033 – obs-service-download_url is vulnerable to argument injection
https://notcve.org/view.php?id=CVE-2024-22033
16 Oct 2024 — The OBS service obs-service-download_url was vulnerable to a command injection vulnerability. The attacker could provide a configuration to the service that allowed to execute command in later steps El servicio OBS obs-service-download_url era vulnerable a una vulnerabilidad de inyección de comandos. El atacante podría proporcionar una configuración al servicio que permitiera ejecutar comandos en pasos posteriores. • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22033 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-22032 – Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec
https://notcve.org/view.php?id=CVE-2024-22032
16 Oct 2024 — A vulnerability has been identified in which an RKE1 cluster keeps constantly reconciling when secrets encryption configuration is enabled. When reconciling, the Kube API secret values are written in plaintext on the AppliedSpec. Cluster owners, Cluster members, and Project members (for projects within the cluster), all have RBAC permissions to view the cluster object from the apiserver. Se ha identificado una vulnerabilidad en la que un clúster RKE1 se reconcilia constantemente cuando se habilita la config... • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22032 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-22030 – Rancher agents can be hijacked by taking over the Rancher Server URL
https://notcve.org/view.php?id=CVE-2024-22030
16 Oct 2024 — A vulnerability has been identified within Rancher that can be exploited in narrow circumstances through a man-in-the-middle (MITM) attack. An attacker would need to have control of an expired domain or execute a DNS spoofing/hijacking attack against the domain to exploit this vulnerability. The targeted domain is the one used as the Rancher URL. Se ha identificado una vulnerabilidad en Rancher que puede explotarse en circunstancias específicas mediante un ataque de intermediario (MITM). Un atacante tendría... • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22030 • CWE-295: Improper Certificate Validation •

CVE-2024-22029 – tomcat packaging allows for escalation to root from tomcat user
https://notcve.org/view.php?id=CVE-2024-22029
16 Oct 2024 — Insecure permissions in the packaging of tomcat allow local users that win a race during package installation to escalate to root Los permisos inseguros en el empaquetado de Tomcat permiten que los usuarios locales que ganan una carrera durante la instalación del paquete escalen a la raíz • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22029 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-32196 – Rancher's External RoleTemplates can lead to privilege escalation
https://notcve.org/view.php?id=CVE-2023-32196
16 Oct 2024 — A vulnerability has been identified whereby privilege escalation checks are not properly enforced for RoleTemplateobjects when external=true, which in specific scenarios can lead to privilege escalation. Se ha identificado una vulnerabilidad por la cual las comprobaciones de escalada de privilegios no se aplican correctamente para los objetos RoleTemplate cuando external=true, lo que en escenarios específicos puede provocar una escalada de privilegios. • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32196 • CWE-269: Improper Privilege Management •

CVE-2023-32194 – Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespaces in 'core'
https://notcve.org/view.php?id=CVE-2023-32194
16 Oct 2024 — A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive * permissions for core namespaces. This can lead to someone being capable of accessing, creating, updating, or deleting a namespace in the project. Se ha identificado una vulnerabilidad al otorgar un rol de creación o * global para un tipo de recurso de "espacios de nombres"; sin importar el grupo de API, el sujeto recibirá * permisos para espacio... • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32194 • CWE-269: Improper Privilege Management •

CVE-2023-32193 – Norman API Cross-site Scripting Vulnerability
https://notcve.org/view.php?id=CVE-2023-32193
16 Oct 2024 — A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in Norman's public API endpoint can be exploited. This can lead to an attacker exploiting the vulnerability to trigger JavaScript code and execute commands remotely. Se ha identificado una vulnerabilidad en la que se pueden explotar cross-site scripting (XSS) no autenticadas en el endpoint de la API pública de Norman. Esto puede llevar a que un atacante aproveche la vulnerabilidad para activar código JavaScript y ejecuta... • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32193 • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2023-32192 – Rancher API Server Cross-site Scripting Vulnerability
https://notcve.org/view.php?id=CVE-2023-32192
16 Oct 2024 — A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in the API Server's public API endpoint can be exploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser Se ha identificado una vulnerabilidad en la que se pueden explotar cross-site scripting (XSS) no autenticadas en el endpoint de la API pública del servidor API, lo que permite a un atacante ejecutar código JavaScript arbitrario en el navegador de la víctima. • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32192 • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2023-32191 – rke's credentials are stored in the RKE1 Cluster state ConfigMap
https://notcve.org/view.php?id=CVE-2023-32191
16 Oct 2024 — When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin. Cuando RKE aprovisiona un clúster, almacena el estado del clúster en un mapa de configuración llamado `full-cluster-state` dentro del espacio de nombres `kube-system` del propio clúster. La información disponible allí permite que los usuarios que no son administradores es... • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32191 • CWE-922: Insecure Storage of Sensitive Information •

CVE-2023-32190 – mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable
https://notcve.org/view.php?id=CVE-2023-32190
16 Oct 2024 — mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges. El script %post de mlocate permite al usuario RUN_UPDATEDB_AS hacer que archivos arbitrarios sean legibles para todo el mundo abusando de operaciones de archivos inseguras que se ejecutan con privilegios de root. • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32190 • CWE-125: Out-of-bounds Read •