Show plain JSON{"containers": {"cna": {"affected": [{"product": "Rancher", "vendor": "SUSE", "versions": [{"lessThan": "2.5.16", "status": "affected", "version": "Rancher", "versionType": "custom"}]}, {"product": "Rancher", "vendor": "SUSE", "versions": [{"lessThan": "2.6.7", "status": "affected", "version": "Rancher", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Florian Struck (from Continum AG) and Marco Stuurman (from Shock Media B.V.)"}], "datePublic": "2022-08-19T00:00:00", "descriptions": [{"lang": "en", "value": "A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-09-07T08:20:15", "orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1193988"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f"}], "source": {"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1193988", "defect": ["1193988"], "discovery": "EXTERNAL"}, "title": "Rancher: Plaintext storage and exposure of credentials in Rancher API and cluster.management.cattle.io object", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2022-08-19T00:00:00.000Z", "ID": "CVE-2021-36782", "STATE": "PUBLIC", "TITLE": "Rancher: Plaintext storage and exposure of credentials in Rancher API and cluster.management.cattle.io object"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Rancher", "version": {"version_data": [{"version_affected": "<", "version_name": "Rancher", "version_value": "2.5.16"}]}}, {"product_name": "Rancher", "version": {"version_data": [{"version_affected": "<", "version_name": "Rancher", "version_value": "2.6.7"}]}}]}, "vendor_name": "SUSE"}]}}, "credit": [{"lang": "eng", "value": "Florian Struck (from Continum AG) and Marco Stuurman (from Shock Media B.V.)"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-312: Cleartext Storage of Sensitive Information"}]}]}, "references": {"reference_data": [{"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193988", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1193988"}, {"name": "https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f", "refsource": "CONFIRM", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f"}]}, "source": {"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1193988", "defect": ["1193988"], "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T01:01:59.069Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1193988"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f"}]}]}, "cveMetadata": {"assignerOrgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "assignerShortName": "suse", "cveId": "CVE-2021-36782", "datePublished": "2022-09-07T08:20:16.064791Z", "dateReserved": "2021-07-19T00:00:00", "dateUpdated": "2024-09-17T04:14:05.504Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}