Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2021-36776

CVE-2021-36776: Rancher's Steve API Component Improper authorization check allows privilege escalation

April 24, 2024

A flaw discovered in Rancher versions from 2.5.0 up to and including 2.5.9 allows an authenticated user to impersonate any user on a cluster through the Steve API proxy, without requiring knowledge of the impersonated user’s credentials. This is due to the Steve API proxy not dropping the impersonation header before sending the request to the Kubernetes API. A malicious user with authenticated access to Rancher could use this to impersonate another user with administrator access in Rancher, receiving, then, administrator level access in the cluster.

References

  • bugzilla.suse.com/show_bug.cgi?id=1189413
  • github.com/advisories/GHSA-gvh9-xgrq-r8hw
  • github.com/rancher/rancher
  • nvd.nist.gov/vuln/detail/CVE-2021-36776

Code Behaviors & Features

Detect and mitigate CVE-2021-36776 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.5.0 before 2.5.10

Fixed versions

  • 2.5.10

Solution

Upgrade to version 2.5.10 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

go/github.com/rancher/rancher/CVE-2021-36776.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:13 +0000.