Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2024-22031

CVE-2024-22031: Rancher users who can create Projects can gain access to arbitrary projects

April 25, 2025 (updated May 5, 2025)

A vulnerability has been identified within Rancher where a user with the ability to create a project, on a certain cluster, can create a project with the same name as an existing project in a different cluster. This results in the user gaining access to the other project in the different cluster, resulting in a privilege escalation. This happens because the namespace used on the local cluster to store related resources (PRTBs and secrets) is the name of the project.

Please consult the associated MITRE ATT&CK - Technique - Privilege Escalation for further information about this category of attack.

References

  • github.com/advisories/GHSA-8h6m-wv39-239m
  • github.com/rancher/rancher
  • github.com/rancher/rancher/security/advisories/GHSA-8h6m-wv39-239m
  • nvd.nist.gov/vuln/detail/CVE-2024-22031
  • pkg.go.dev/vuln/GO-2025-3647

Code Behaviors & Features

Detect and mitigate CVE-2024-22031 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.8.0 before 2.9.9, all versions starting from 2.10.0 before 2.10.5, all versions starting from 2.11.0 before 2.11.1

Fixed versions

  • 2.9.9
  • 2.10.5
  • 2.11.1

Solution

Upgrade to versions 2.10.5, 2.11.1, 2.9.9 or above.

Impact 8.5 HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

go/github.com/rancher/rancher/CVE-2024-22031.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:20 +0000.