Skip to main content

Improper Privilege Management

CVE-2023-22647

Severity High
Score 8/10

Summary

An Improper Privilege Management vulnerability in SUSE Rancher versions through 2.6.12, and 2.7.0-rc1 through 2.7.3 allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the local cluster.

  • LOW
  • ADJACENT_NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • LOW
  • HIGH
  • HIGH

CWE-269 - Improper Privilege Management

An effective privilege management infrastructure provides valid users with required access and privileges across heterogeneous technology environments. An application with a faulty privilege management infrastructure allows higher than authorized privileges or enables privilege escalation. This can lead to security incidents such as system infiltration, data breach, and complete system takeover.

Advisory Timeline

  • Published