rancher-agent-2.8
2.8.10-r0
7.7
CVSS V3
github.com/rancher/steve's users can issue watch commands for arbitrary resources
A vulnerability has been discovered in Steve API (Kubernetes API Translator) in which users can watch resources they are not allowed to access, when they have at least some generic permissions on the type. For example, a user who can get a single secret in a single namespace can get all secrets in every namespace.
During a watch
request for a single ID, the following occurs:
This allows any requester to see the contents of any object such as secret keys, signing certificates, API tokens.
Please consult the associated MITRE ATT&CK - Technique - Valid Accounts and MITRE ATT&CK - Technique - Container and Resource Discovery for further information about this category of attack.
To address this issue, the fix introduces a change in the behavior of the Steve API.
When issuing a watch
request with an ID specified, the requester's permissions are now correctly honoured. This will deny events for objects the requester cannot actually access. Previously these events were returned unconditionally, allowing any requester to see the contents of any object.
Patched versions include the following commits:
There are no workarounds for this issue. Users are recommended to upgrade, as soon as possible, to a version of Steve API/Rancher Manager which contains the fixes.
If you have any questions or comments about this advisory: