CVE-2022-43757:
Plaintext storage of sensitive data in Rancher API and cluster.management.cattle.io objects
8.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/rancher/rancher | go | >= 2.5.0, < 2.5.17 | 2.5.17 |
github.com/rancher/rancher | go | >= 2.6.0, < 2.6.10 | 2.6.10 |
github.com/rancher/rancher | go | >= 2.7.0, < 2.7.1 | 2.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from sensitive fields being stored in plaintext within Kubernetes objects (e.g., Clusters) due to insufficient data handling in Rancher's code. While the advisory lists specific struct fields (e.g., Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESGCM.Keys[].Secret), the exact functions responsible for serializing/storing these fields are not explicitly named in the provided data. The root cause likely involves functions that process and persist Cluster objects without redacting sensitive data or migrating it to Secrets. However, without access to the specific commit diffs, GitHub patches, or Rancher's internal code structure, identifying the precise vulnerable functions (e.g., specific controller methods or API handlers) with high confidence is not possible. The advisory focuses on struct-level fields rather than functions, making function-level attribution speculative.