CVE-2019-12274 in Rancher and Suse Products
Published on June 6, 2019
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
Products Associated with CVE-2019-12274
stack.watch emails you whenever new vulnerabilities are published in Rancher or Suse Rancher. Just hit a watch button to start following.
Exploit Probability
EPSS
0.19%
Percentile
40.83%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.