Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher/server
  4. ›
  5. CVE-2019-11202

CVE-2019-11202: Credentials Management

July 30, 2019 (updated August 12, 2019)

When Rancher starts for the first time, it creates a default admin user with a well-known password. After initial setup, the Rancher administrator may choose to delete this default admin user. If Rancher is restarted, the default admin user will be recreated with the well-known default password. An attacker could exploit this by logging in with the default admin credentials. This can be mitigated by deactivating the default admin user rather than completing deleting them.

References

  • forums.rancher.com/c/announcements
  • nvd.nist.gov/vuln/detail/CVE-2019-11202
  • rancher.com/docs/rancher/v2.x/en/security/

Code Behaviors & Features

Detect and mitigate CVE-2019-11202 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 up to 2.0.13, all versions starting from 2.1.0 up to 2.1.8, all versions starting from 2.2.0 up to 2.2.1

Fixed versions

  • v2.3.0

Solution

Upgrade to version 2.3.0 or above.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

go/github.com/rancher/rancher/server/CVE-2019-11202.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:09 +0000.