Miggo Logo

GHSA-x7xj-jvwp-97rv: RKE2 allows privilege escalation in Windows nodes due to Insecure Access Control Lists

9.1

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
10/25/2024
Updated
10/25/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/rancher/rke2go>= 1.27.0, < 1.27.151.27.15
github.com/rancher/rke2go>= 1.28.0, < 1.28.111.28.11
github.com/rancher/rke2go>= 1.29.0, < 1.29.61.29.6
github.com/rancher/rke2go>= 1.30.0, < 1.30.21.30.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure ACLs on sensitive files in Windows environments. While exact function names aren't provided in advisories, the root cause must be in functions that: 1) Create()/write sensitive files (password, logs, binaries) 2) Set file/directory permissions during deployment. The workaround PowerShell script modifying ACLs implies the native implementation lacks proper permission hardening. Confidence is medium due to indirect evidence from impact description and mitigation guidance, but limited by absence of specific code references.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * vuln*r**ility **s ***n i**nti*i** w**r**y RK** **ploym*nts in Win*ows no**s **v* w**k ****ss *ontrol Lists (**L), *llowin* `*UILTIN\Us*rs` or `NT *UT*ORITY\*ut**nti**t** Us*rs` to vi*w or **it s*nsitiv* *il*s w*i** *oul* l*** to privil*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* **Ls on s*nsitiv* *il*s in Win*ows *nvironm*nts. W*il* *x**t *un*tion n*m*s *r*n't provi*** in **visori*s, t** root **us* must ** in *un*tions t**t: *) `*r**t*()`/writ* s*nsitiv* *il*s (p*sswor*, lo*s, *in*ri*s)