Filtered by vendor Rancher
Subscriptions
Filtered by product Rancher
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-36776 | 1 Rancher | 1 Rancher | 2024-11-21 | 8.8 High |
A Improper Access Control vulnerability in SUSE Rancher allows remote attackers impersonate arbitrary users. This issue affects: SUSE Rancher Rancher versions prior to 2.5.10. | ||||
CVE-2021-36775 | 1 Rancher | 1 Rancher | 2024-11-21 | 8.8 High |
a Improper Access Control vulnerability in SUSE Rancher allows users to keep privileges that should have been revoked. This issue affects: SUSE Rancher Rancher versions prior to 2.4.18; Rancher versions prior to 2.5.12; Rancher versions prior to 2.6.3. | ||||
CVE-2021-31999 | 1 Rancher | 1 Rancher | 2024-11-21 | 8.8 High |
A Reliance on Untrusted Inputs in a Security Decision vulnerability in Rancher allows users in the cluster to act as others users in the cluster by forging the "Impersonate-User" or "Impersonate-Group" headers. This issue affects: Rancher versions prior to 2.5.9. Rancher versions prior to 2.4.16. | ||||
CVE-2021-25320 | 1 Rancher | 1 Rancher | 2024-11-21 | 9.9 Critical |
A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16. | ||||
CVE-2021-25318 | 1 Rancher | 1 Rancher | 2024-11-21 | 8.8 High |
A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to. This issue affects: Rancher versions prior to 2.5.9 ; Rancher versions prior to 2.4.16. | ||||
CVE-2023-22649 | 2 Rancher, Suse | 2 Rancher, Rancher | 2024-10-31 | 8.4 High |
A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue. | ||||
CVE-2023-32194 | 1 Rancher | 1 Rancher | 2024-10-16 | 7.2 High |
A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive * permissions for core namespaces. This can lead to someone being capable of accessing, creating, updating, or deleting a namespace in the project. | ||||
CVE-2023-32196 | 1 Rancher | 1 Rancher | 2024-10-16 | 6.6 Medium |
A vulnerability has been identified whereby privilege escalation checks are not properly enforced for RoleTemplateobjects when external=true, which in specific scenarios can lead to privilege escalation. |
Page 1 of 1.