Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/steve
  4. ›
  5. CVE-2023-32198

CVE-2023-32198: Steve doesn’t verify a server’s certificate and is susceptible to man-in-the-middle (MitM) attacks

April 25, 2025 (updated May 5, 2025)

A vulnerability has been identified in Steve where by default it was using an insecure option that did not validate the certificate presented by the remote server while performing a TLS connection. This could allow the execution of a man-in-the-middle (MitM) attack against services using Steve.

For example, Rancher relies on Steve as a dependency for its user interface (UI) to proxy requests to Kubernetes clusters. Users who have the permission to create a service in Rancher’s local cluster can take over Rancher’s UI and display their own UI to gather sensitive information. This is only possible when the setting ui-offline-preferred is manually set to remote (by default Rancher sets it to dynamic). This enables further attacks such as cross-site scripting (XSS), or tampering the UI to collect passwords from other users etc.

Please consult the associated MITRE ATT&CK - Technique - Adversary-in-the-Middle for further information about this category of attack.

References

  • github.com/advisories/GHSA-95fc-g4gj-mqmx
  • github.com/rancher/steve
  • github.com/rancher/steve/security/advisories/GHSA-95fc-g4gj-mqmx
  • nvd.nist.gov/vuln/detail/CVE-2023-32198
  • pkg.go.dev/vuln/GO-2025-3648

Code Behaviors & Features

Detect and mitigate CVE-2023-32198 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.2.0 before 0.2.1, all versions starting from 0.3.0 before 0.3.3, all versions starting from 0.4.0 before 0.4.4, all versions starting from 0.5.0 before 0.5.13

Fixed versions

  • 0.2.1
  • 0.3.3
  • 0.4.4
  • 0.5.13

Solution

Upgrade to versions 0.2.1, 0.3.3, 0.4.4, 0.5.13 or above.

Impact 8 HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation

Source file

go/github.com/rancher/steve/CVE-2023-32198.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:40 +0000.