ghsa-g25r-gvq3-wrq7
Vulnerability from github
Impact
An issue was discovered in Rancher where an authorization logic flaw allows an authenticated user on any downstream cluster to (1) open a shell pod in the Rancher local
cluster and (2) have limited kubectl
access to it. The expected behavior is that a user does not have such access in the Rancher local
cluster unless explicitly granted.
This issue does not allow the user to escalate privileges in the local
cluster directly (this would require another vulnerability to be exploited).
The security issue happens in two different ways:
-
Shell pod access - This is when a user opens a shell pod in the Rancher UI to a downstream cluster that the user has permission to access. The web request can be intercepted using the browser's web inspector/network console or a proxy tool to change the shell's destination to the Rancher
local
cluster instead of the desired downstream cluster. -
This flaw cannot be exploited to access a downstream cluster that the user has no permissions to.
-
The shell pod runs with a limited non-root user, reducing the severity of this issue. However, even as a non-root user, it is still possible download and run binaries inside the shell pod.
-
The blast radius of this issue can increase based on the configuration of the
local
cluster. For example:-
If the
local
cluster has unlimited network access, e.g. to the Internet, the user can open a reverse network connection to the shell pod. -
Or access the cloud metadata API of the underlying cloud infrastructure, where the user can extract the credentials associated with the
local
cluster and use them to interact with the cloud environment (this will be limited by the permissions granted to the cloud credentials in question). -
Check further recommendations about liming access to the cloud metadata API in Rancher's security best practices.
-
-
Kubectl access - When downloading the kubeconfig file of a downstream cluster that the user has access to, the
server
cluster address in the kubeconfig file can be changed to point to the Rancherlocal
cluster instead of the intended downstream cluster.-
This can also be achieved by crafting a kubeconfig using a Rancher token instead of using the kubeconfig from an active cluster.
-
This flaw cannot be exploited to access a downstream cluster that the user has no permissions to.
-
Notes:
- Rancher local
cluster means the cluster where Rancher is installed. It is named as local
inside the list of clusters in the Rancher UI.
- Audit logs in Rancher can be used to identify possible abuses of this issue, by tracking API requests to the user ID of the user that performed the action. API audit logs can be enabled as described in the documentation when set to level 1
or above.
Workarounds
There is no workaround or direct mitigation besides updating to a patched Rancher version.
Patches
Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.
For more information
If you have any questions or comments about this advisory:
- Reach out to SUSE Rancher Security team for security related inquiries.
- Open an issue in Rancher repository.
- Verify our support matrix and product support lifecycle.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/rancher/rancher" }, "ranges": [ { "events": [ { "introduced": "2.5.0" }, { "fixed": "2.5.17" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/rancher/rancher" }, "ranges": [ { "events": [ { "introduced": "2.6.0" }, { "fixed": "2.6.10" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/rancher/rancher" }, "ranges": [ { "events": [ { "introduced": "2.7.0" }, { "fixed": "2.7.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-21953" ], "database_specific": { "cwe_ids": [ "CWE-284", "CWE-285", "CWE-862" ], "github_reviewed": true, "github_reviewed_at": "2023-01-25T19:36:09Z", "nvd_published_at": "2023-02-07T13:15:00Z", "severity": "HIGH" }, "details": "### Impact\n\nAn issue was discovered in Rancher where an authorization logic flaw allows an authenticated user on any downstream cluster to (1) open a shell pod in the Rancher `local` cluster and (2) have limited `kubectl` access to it. The expected behavior is that a user does not have such access in the Rancher `local` cluster unless explicitly granted.\n\nThis issue does not allow the user to escalate privileges in the `local` cluster directly (this would require another vulnerability to be exploited).\n\nThe security issue happens in two different ways:\n\n1. Shell pod access - This is when a user opens a shell pod in the Rancher UI to a downstream cluster that the user has permission to access. The web request can be intercepted using the browser\u0027s web inspector/network console or a proxy tool to change the shell\u0027s destination to the Rancher `local` cluster instead of the desired downstream cluster.\n\n - This flaw cannot be exploited to access a downstream cluster that the user has no permissions to.\n\n - The shell pod runs with a limited non-root user, reducing the severity of this issue. However, even as a non-root user, it is still possible download and run binaries inside the shell pod.\n\n - The blast radius of this issue can increase based on the configuration of the `local` cluster. For example:\n\n - If the `local` cluster has unlimited network access, e.g. to the Internet, the user can open a reverse network connection to the shell pod.\n\n - Or access the cloud metadata API of the underlying cloud infrastructure, where the user can extract the credentials associated with the `local` cluster and use them to interact with the cloud environment (this will be limited by the permissions granted to the cloud credentials in question). \n\n - Check further recommendations about liming access to the cloud metadata API in Rancher\u0027s [security best practices](https://ranchermanager.docs.rancher.com/reference-guides/rancher-security/kubernetes-security-best-practices).\n\n2. Kubectl access - When downloading the kubeconfig file of a downstream cluster that the user has access to, the `server` cluster address in the kubeconfig file can be changed to point to the Rancher `local` cluster instead of the intended downstream cluster.\n\n - This can also be achieved by crafting a kubeconfig using a Rancher token instead of using the kubeconfig from an active cluster. \n\n - This flaw cannot be exploited to access a downstream cluster that the user has no permissions to.\n\nNotes:\n- Rancher `local` cluster means the cluster where Rancher is installed. It is named as `local` inside the list of clusters in the Rancher UI.\n- Audit logs in Rancher can be used to identify possible abuses of this issue, by tracking API requests to the user ID of the user that performed the action. API audit logs can be enabled as described in the [documentation](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) when set to level `1` or above.\n\n### Workarounds\n\nThere is no workaround or direct mitigation besides updating to a patched Rancher version.\n\n### Patches\n\nPatched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).", "id": "GHSA-g25r-gvq3-wrq7", "modified": "2023-02-07T15:49:33Z", "published": "2023-01-25T19:36:09Z", "references": [ { "type": "WEB", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-g25r-gvq3-wrq7" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21953" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1199731" }, { "type": "PACKAGE", "url": "https://github.com/rancher/rancher" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "type": "CVSS_V3" } ], "summary": "Authenticated user can gain unauthorized shell pod and kubectl access in the local cluster" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.