Improper Privilege Management in SUSE Rancher Affects Kubernetes Secrets
CVE-2023-22647
8HIGH
Summary
An Improper Privilege Management vulnerability in SUSE Rancher enables standard users to exploit their permissions for manipulating Kubernetes secrets within the local cluster. This flaw permits users to delete secrets while maintaining read-level permissions for those secrets. If exploited alongside other specially crafted commands, this could result in unauthorized access to sensitive tokens associated with service accounts in the local cluster, potentially compromising the integrity of the Kubernetes environment.
Affected Version(s)
Rancher >= 2.6.0 < 2.6.0
Rancher >= 2.7.0 < 2.7.0
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved