Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher/server
  4. ›
  5. CVE-2019-13209

CVE-2019-13209: Cross-site Scripting

September 4, 2019 (updated September 6, 2019)

Rancher is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster’s Kubernetes API with the permissions and identity of the victim.

References

  • forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801
  • nvd.nist.gov/vuln/detail/CVE-2019-13209

Code Behaviors & Features

Detect and mitigate CVE-2019-13209 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 up to 2.2.4

Fixed versions

  • v2.3.0

Solution

Upgrade to version 2.3.0 or above.

Impact 6.1 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

go/github.com/rancher/rancher/server/CVE-2019-13209.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.