Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2024-58259

CVE-2024-58259: Rancher affected by unauthenticated Denial of Service

August 29, 2025

A vulnerability has been identified within Rancher Manager in which it did not enforce request body size limits on certain public (unauthenticated) and authenticated API endpoints. This allows a malicious user to exploit this by sending excessively large payloads, which are fully loaded into memory during processing. This could result in:

  • Denial of Service (DoS): The server process may crash or become unresponsive when memory consumption exceeds available resources.
  • Unauthenticated and authenticated exploitation: While the issue was initially observed in unauthenticated /v3-public/* endpoints, the absence of request body size limits also affected several authenticated APIs, broadening the potential attack surface. It’s worth noting that other areas in Rancher do implement safeguards: requests proxied to Kubernetes APIs are subject to built-in size limits enforced by the Kubernetes API server itself, and Norman-based endpoints parse input with predefined size caps. However, the absence of similar protections in other Rancher APIs increased the risk of denial-of-service (DoS) scenarios in certain contexts.

By sending large binary or text payloads to vulnerable endpoints, a malicious actor could disrupt Rancher’s availability, impacting both administrative and user operations across managed clusters.

Please consult the associated MITRE ATT&CK - Technique - Network Denial of Service for further information about this category of attack.

References

  • github.com/advisories/GHSA-4h45-jpvh-6p5j
  • github.com/rancher/rancher
  • github.com/rancher/rancher/commit/aee95d4e2a41ba2df6f88c9634d4fe1f42dee4d9
  • github.com/rancher/rancher/releases/tag/v2.10.9
  • github.com/rancher/rancher/releases/tag/v2.11.5
  • github.com/rancher/rancher/releases/tag/v2.12.1
  • github.com/rancher/rancher/releases/tag/v2.9.11
  • github.com/rancher/rancher/security/advisories/GHSA-4h45-jpvh-6p5j
  • nvd.nist.gov/vuln/detail/CVE-2024-58259

Code Behaviors & Features

Detect and mitigate CVE-2024-58259 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.9.0 before 2.9.11, all versions starting from 2.10.0 before 2.10.9, all versions starting from 2.11.0 before 2.11.5, all versions starting from 2.12.0 before 2.12.1

Fixed versions

  • 2.12.1
  • 2.11.5
  • 2.10.9
  • 2.9.11

Solution

Upgrade to versions 2.10.9, 2.11.5, 2.12.1, 2.9.11 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/github.com/rancher/rancher/CVE-2024-58259.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 23 Jan 2026 12:17:25 +0000.