Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2019-11881

CVE-2019-11881: Rancher Login Parameter Can Be Edited

May 24, 2022 (updated December 4, 2024)

A vulnerability exists in Rancher 2.1.4 in the login component, where the errorMsg parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There’s no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a “This version of Rancher is outdated, please visit https://malicious.rancher.site/upgrading" message.

References

  • github.com/MauroEldritch/VanCleef
  • github.com/advisories/GHSA-2p4g-jrmx-r34m
  • github.com/rancher/rancher
  • github.com/rancher/rancher/blob/v2.2.4/pkg/auth/providers/saml/saml_client.go
  • github.com/rancher/rancher/commit/e59adbc7565251919d84d6e353421104be8da06e
  • github.com/rancher/rancher/issues/20216
  • nvd.nist.gov/vuln/detail/CVE-2019-11881

Code Behaviors & Features

Detect and mitigate CVE-2019-11881 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.1.4

Solution

Unfortunately, there is no solution available yet.

Impact 4.7 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Learn more about CVSS

Source file

go/github.com/rancher/rancher/CVE-2019-11881.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.