2023-05-04 12:00:27 +02:00
{
"id" : "CVE-2023-22651" ,
"sourceIdentifier" : "meissner@suse.de" ,
"published" : "2023-05-04T08:15:22.893" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:45:08.013" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-05-04 12:00:27 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher's admission Webhook may lead to\n the misconfiguration of the Webhook. This component enforces validation\n rules and security checks before resources are admitted into the \nKubernetes cluster.\nThe issue only affects users that upgrade from 2.6.x or 2.7.x to 2.7.2. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.\n\n"
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-05-10 22:00:28 +02:00
{
2024-12-08 03:06:42 +00:00
"source" : "meissner@suse.de" ,
"type" : "Secondary" ,
2023-05-10 22:00:28 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.9 ,
"baseSeverity" : "CRITICAL" ,
2023-05-10 22:00:28 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-05-10 22:00:28 +02:00
} ,
"exploitabilityScore" : 3.1 ,
"impactScore" : 6.0
} ,
2023-05-04 12:00:27 +02:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-05-04 12:00:27 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.9 ,
"baseSeverity" : "CRITICAL" ,
2023-05-04 12:00:27 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-05-04 12:00:27 +02:00
} ,
"exploitabilityScore" : 3.1 ,
"impactScore" : 6.0
}
]
} ,
"weaknesses" : [
{
"source" : "meissner@suse.de" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-05-04 12:00:27 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-269"
}
]
}
] ,
2023-05-10 22:00:28 +02:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.6.0" ,
"versionEndIncluding" : "2.7.2" ,
"matchCriteriaId" : "6349F4D5-2D10-40A4-B22A-8CC94B65FBE3"
}
]
}
]
}
] ,
2023-05-04 12:00:27 +02:00
"references" : [
{
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22651" ,
2023-05-10 22:00:28 +02:00
"source" : "meissner@suse.de" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
2023-05-04 12:00:27 +02:00
} ,
{
"url" : "https://github.com/rancher/rancher/security/advisories/GHSA-6m9f-pj6w-w87g" ,
2023-05-10 22:00:28 +02:00
"source" : "meissner@suse.de" ,
"tags" : [
"Mitigation" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22651" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://github.com/rancher/rancher/security/advisories/GHSA-6m9f-pj6w-w87g" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mitigation" ,
"Third Party Advisory"
]
2023-05-04 12:00:27 +02:00
}
]
}