GHSA-x7xj-jvwp-97rv: RKE2 allows privilege escalation in Windows nodes due to Insecure Access Control Lists
9.1
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
10/25/2024
Updated
10/25/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/rancher/rke2 | go | >= 1.27.0, < 1.27.15 | 1.27.15 |
github.com/rancher/rke2 | go | >= 1.28.0, < 1.28.11 | 1.28.11 |
github.com/rancher/rke2 | go | >= 1.29.0, < 1.29.6 | 1.29.6 |
github.com/rancher/rke2 | go | >= 1.30.0, < 1.30.2 | 1.30.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure ACLs on sensitive files in Windows environments. While exact function names aren't provided in advisories, the root cause must be in functions that: 1) Create()
/write sensitive files (password, logs, binaries) 2) Set file/directory permissions during deployment. The workaround PowerShell
script modifying ACLs implies the native implementation lacks proper permission hardening. Confidence is medium due to indirect evidence from impact description and mitigation guidance, but limited by absence of specific code references.