Miggo Logo

CVE-2023-22647:
Rancher vulnerable to Privilege Escalation via manipulation of Secrets

10

CVSS Score
3.1

Basic Information

EPSS Score
0.68065%
Published
6/6/2023
Updated
10/9/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/rancher/ranchergo>= 2.6.0, < 2.6.132.6.13
github.com/rancher/ranchergo>= 2.7.0, < 2.7.42.7.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability reports describe a privilege escalation via improper handling of Kubernetes Secrets permissions, but no specific function names or code paths are explicitly mentioned in the available data. The CWE-267 and CWE-269 classifications suggest unsafe privilege definitions and improper RBAC management, but the GitHub Security Advisory, NVD details, and release notes only describe the vulnerability at a high level (e.g., retention of read permissions after Secret deletion). The Rancher patches (v2.6.13/v2.7.4) likely addressed this by modifying Secret lifecycle management and RBAC validation logic, but without access to the commit diffs or GitHub patch details, we cannot confidently identify specific vulnerable functions. The absence of 'Current Vulnerable Functions' in the package listings further supports this conclusion.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * vuln*r**ility **s ***n i**nti*i** w*i** *n**l*s [St*n**r* us*rs](*ttps://r*n***rm*n***r.*o*s.r*n***r.*om/*ow-to-*ui**s/n*w-us*r-*ui**s/*ut**nti**tion-p*rmissions-*n*-*lo**l-*on*i*ur*tion/m*n***-rol*-**s**-****ss-*ontrol-r***/*lo**l-p*rm

Reasoning

T** provi*** vuln*r**ility r*ports **s*ri** * privil*** *s**l*tion vi* improp*r **n*lin* o* Ku**rn*t*s S**r*ts p*rmissions, *ut no sp**i*i* *un*tion n*m*s or *o** p*t*s *r* *xpli*itly m*ntion** in t** *v*il**l* **t*. T** *W*-*** *n* *W*-*** *l*ssi*i*