Improper Privilege Management
CVE-2023-22647
Summary
An Improper Privilege Management vulnerability in SUSE Rancher versions through 2.6.12, and 2.7.0-rc1 through 2.7.3 allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster.
- LOW
- ADJACENT_NETWORK
- HIGH
- UNCHANGED
- NONE
- LOW
- HIGH
- HIGH
CWE-269 - Improper Privilege Management
An effective privilege management infrastructure provides valid users with required access and privileges across heterogeneous technology environments. An application with a faulty privilege management infrastructure allows higher than authorized privileges or enables privilege escalation. This can lead to security incidents such as system infiltration, data breach, and complete system takeover.
References
Advisory Timeline
- Published