Miggo Logo

CVE-2024-22036: Rancher Remote Code Execution via Cluster/Node Drivers

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.21405%
Published
10/25/2024
Updated
10/25/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/rancher/ranchergo>= 2.7.0, < 2.7.162.7.16
github.com/rancher/ranchergo>= 2.8.0, < 2.8.92.8.9
github.com/rancher/ranchergo>= 2.9.0, < 2.9.32.9.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from three primary issues: (1) The NewPlugin function in rancher/machine did not enforce non-root UID/GID when launching plugin servers, allowing privilege escalation. (2) Driver package functions failed to validate() if downloaded binaries were regular files, enabling symlink attacks. (3) Jail mechanism functions executed drivers with root privileges, bypassing isolation. The patches explicitly modify NewPlugin and the driver package's validation logic, confirming their role in the vulnerability. Jail-related functions are inferred from the described insecure permissions and subsequent security enhancements.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * vuln*r**ility **s ***n i**nti*i** wit*in R*n***r w**r* * *lust*r or no** *riv*r **n ** us** to *s**p* t** `**root` j*il *n* **in root ****ss to t** R*n***r *ont*in*r its*l*. In pro*u*tion *nvironm*nts, *urt**r privil*** *s**l*tion is pos

Reasoning

T** vuln*r**ility st*ms *rom t*r** prim*ry issu*s: (*) T** `N*wPlu*in` *un*tion in `r*n***r/m***in*` *i* not *n*or** non-root UI*/*I* w**n l*un**in* plu*in s*rv*rs, *llowin* privil*** *s**l*tion. (*) *riv*r p**k*** *un*tions **il** to `v*li**t*()` i*
CVE-2024-22036: Rancher Driver Jail Escape RCE | Miggo