In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:17:39.668Z
Reserved: 2019-05-21T00:00:00
Link: CVE-2019-12274

No data.

Status : Modified
Published: 2019-06-06T16:29:01.247
Modified: 2024-11-21T04:22:32.647
Link: CVE-2019-12274

No data.