CVE-2019-12274

In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*

History

13 Apr 2022, 23:44

Type Values Removed Values Added
CPE cpe:2.3:a:rancher:rancher:*:*:*:*:*:*:*:* cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*
First Time Suse rancher
Suse

Information

Published : 2019-06-06 16:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-12274

Mitre link : CVE-2019-12274

CVE.ORG link : CVE-2019-12274


JSON object : View

Products Affected

suse

  • rancher
CWE
CWE-668

Exposure of Resource to Wrong Sphere

CWE-862

Missing Authorization