CVE-2021-36776:
Rancher's Steve API Component Improper authorization check allows privilege escalation
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.34277%
CWE
Published
4/24/2024
Updated
8/7/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/rancher/rancher | go | >= 2.5.0, <= 2.5.9 | 2.5.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the Steve API proxy not sanitizing impersonation headers before proxying requests to Kubernetes. The primary function responsible for handling HTTP requests in the Steve API proxy is Handler.ServeHTTP
in pkg/steve/proxy/proxy.go
. Since the flaw explicitly involves improper header handling during proxying, this function is the logical point where the header sanitization should occur. The lack of header filtering here would directly enable the privilege escalation described. While explicit code isn't provided, the component structure and vulnerability mechanics strongly implicate this function.