CVE-2023-22647:
Rancher vulnerable to Privilege Escalation via manipulation of Secrets
10
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/rancher/rancher | go | >= 2.6.0, < 2.6.13 | 2.6.13 |
github.com/rancher/rancher | go | >= 2.7.0, < 2.7.4 | 2.7.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability reports describe a privilege escalation via improper handling of Kubernetes Secrets permissions, but no specific function names or code paths are explicitly mentioned in the available data. The CWE-267 and CWE-269 classifications suggest unsafe privilege definitions and improper RBAC management, but the GitHub Security Advisory, NVD details, and release notes only describe the vulnerability at a high level (e.g., retention of read permissions after Secret deletion). The Rancher patches (v2.6.13
/v2.7.4
) likely addressed this by modifying Secret lifecycle management and RBAC validation
logic, but without access to the commit diffs or GitHub patch details, we cannot confidently identify specific vulnerable functions. The absence of 'Current Vulnerable Functions' in the package listings further supports this conclusion.