// For flags

CVE-2021-36782

Rancher: Plaintext storage and exposure of credentials in Rancher API and cluster.management.cattle.io object

Severity Score

9.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7.

Una vulnerabilidad de Almacenamiento en Texto sin Cifrar de Información confidencial en SUSE Rancher permite a propietarios de clústeres, los miembros de clústeres, los propietarios de proyectos, los miembros de proyectos y la base de usuarios autenticados usar la API de Kubernetes para recuperar una versión en texto sin cifrar de datos confidenciales. Este problema afecta a: SUSE Rancher versiones anteriores a 2.5.16; Rancher versiones anteriores a 2.6.7

An issue was discovered in Rancher versions up to and including 2.5.15 and 2.6.6 where sensitive fields, like passwords, API keys and Ranchers service account token (used to provision clusters), were stored in plaintext directly on Kubernetes objects like Clusters, for example cluster.management.cattle.io. Anyone with read access to those objects in the Kubernetes API could retrieve the plaintext version of those sensitive data.

*Credits: Florian Struck (from Continum AG) and Marco Stuurman (from Shock Media B.V.)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-07-19 CVE Reserved
  • 2022-09-07 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • 2024-11-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-312: Cleartext Storage of Sensitive Information
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Suse
Search vendor "Suse"
Rancher
Search vendor "Suse" for product "Rancher"
>= 2.5.0 < 2.5.16
Search vendor "Suse" for product "Rancher" and version " >= 2.5.0 < 2.5.16"
-
Affected
Suse
Search vendor "Suse"
Rancher
Search vendor "Suse" for product "Rancher"
>= 2.6.0 < 2.6.7
Search vendor "Suse" for product "Rancher" and version " >= 2.6.0 < 2.6.7"
-
Affected