Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim.
| Software | From | Fixed in |
|---|---|---|
| suse / rancher | 2.0.0 | 2.2.4.x |
github.com/rancher/rancher/server
|
2.0.0 | 2.0.16 |
github.com/rancher/rancher/server
|
2.1.0 | 2.1.11 |
github.com/rancher/rancher/server
|
2.2.0 | 2.2.5 |