You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A vulnerability has been identified in which Rancher does not automatically
clean up a user which has been deleted from the configured authentication
provider (AP). This characteristic also applies to disabled or revoked users,
Rancher will not reflect these modifications which may leave the user’s tokens
still usable.
An AP must be enabled to be affected by this, as the built-in User Management
feature is not affected by this vulnerability. This issue may lead to an
adversary gaining unauthorized access, as the user’s access privileges may
still be active within Rancher even ...
Advisory GHSA-9ghh-mmcq-8phc references a vulnerability in the following Go modules:
Description:
Impact
A vulnerability has been identified in which Rancher does not automatically
clean up a user which has been deleted from the configured authentication
provider (AP). This characteristic also applies to disabled or revoked users,
Rancher will not reflect these modifications which may leave the user’s tokens
still usable.
An AP must be enabled to be affected by this, as the built-in User Management
feature is not affected by this vulnerability. This issue may lead to an
adversary gaining unauthorized access, as the user’s access privileges may
still be active within Rancher even ...
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: