Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2024-58267

CVE-2024-58267: Rancher CLI SAML authentication is vulnerable to phishing attacks

September 26, 2025 (updated October 23, 2025)

A vulnerability has been identified within Rancher Manager whereby the SAML authentication from the Rancher CLI tool is vulnerable to phishing attacks. The custom authentication protocol for SAML-based providers can be abused to steal Rancher’s authentication tokens.

Rancher Manager deployments without SAML authentication enabled are not affected by this vulnerability.

An attacker can generate a phishing SAML login URL which contains a publicKey and requestId controlled by the attacker. The attacker can then give the link to another user (eg: admin) and if the victim goes to the link unsuspectingly, they might not notice the bad parameters in the URL. The user will be prompted to login and might believe that its session has ended so they need to re-login. By clicking on the link, they will be logged in and an encrypted token will be created with the attacker’s public key. The attacker can then decrypt the victim’s Rancher token, enabling the attack

Please consult the associated MITRE ATTACK Techniques - Privilege Escalation for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2024-58267
  • github.com/advisories/GHSA-v3vj-5868-2ch2
  • github.com/rancher/rancher
  • github.com/rancher/rancher/security/advisories/GHSA-v3vj-5868-2ch2
  • nvd.nist.gov/vuln/detail/CVE-2024-58267
  • pkg.go.dev/vuln/GO-2025-3984

Code Behaviors & Features

Detect and mitigate CVE-2024-58267 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.9.0 before 2.9.12, all versions starting from 2.10.0 before 2.10.10, all versions starting from 2.11.0 before 2.11.6, all versions starting from 2.12.0 before 2.12.2

Fixed versions

  • 2.12.2
  • 2.11.6
  • 2.10.10
  • 2.9.12

Solution

Upgrade to versions 2.10.10, 2.11.6, 2.12.2, 2.9.12 or above.

Impact 8 HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-345: Insufficient Verification of Data Authenticity

Source file

go/github.com/rancher/rancher/CVE-2024-58267.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 10 Feb 2026 00:20:22 +0000.