Cross-site Request Forgery (CSRF)

Affecting github.com/rancher/rancher/pkg/clusterrouter package, versions >=2.0.0 <2.0.16 || >=2.1.0 <2.1.11 || >=2.2.0 <2.2.5

Do your applications use this vulnerable package? Test your applications

Overview

github.com/rancher/rancher/pkg/clusterrouter is a project that provides a container management platform built for organizations that deploy containers in production

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). It allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. The exploiter is then able to execute commands against the victims' cluster's Kubernetes API with the permissions and identity of the victim.

Remediation

Upgrade github.com/rancher/rancher/pkg/clusterrouter to version 2.0.16, 2.1.11, 2.2.5 or higher.

References

CVSS Score

8.7
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    Required
  • Scope
    Changed
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:H
Credit
Matt Belisle, Alex Stevenson
CVE
CVE-2019-13209
CWE
CWE-352
Snyk ID
SNYK-GOLANG-GITHUBCOMRANCHERRANCHERPKGCLUSTERROUTER-460823
Disclosed
04 Sep, 2019
Published
04 Sep, 2019