Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-22650 | 8.8 HIGH | Rancher does not automatically clean up a user deleted or disabled from the configured Aut |
| CVE-2023-22649 | 8.4 HIGH | Rancher 'Audit Log' leaks sensitive information |
| CVE-2023-32193 | 8.3 HIGH | Norman API Cross-site Scripting Vulnerability |
| CVE-2023-32192 | 8.3 HIGH | Rancher API Server Cross-site Scripting Vulnerability |
| CVE-2024-22030 | 8.0 HIGH | Rancher agents can be hijacked by taking over the Rancher Server URL |
| CVE-2024-22029 | 7.8 HIGH | tomcat packaging allows for escalation to root from tomcat user |
| CVE-2023-32194 | 7.2 HIGH | Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespac |
| CVE-2023-32196 | 6.6 MEDIUM | Rancher's External RoleTemplates can lead to privilege escalation |
| CVE-2024-22032 | 6.5 MEDIUM | Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec |
| CVE-2024-22033 | 6.3 MEDIUM | obs-service-download_url is vulnerable to argument injection |
| CVE-2023-32189 | 5.9 MEDIUM | Insecure handling SSH key in SUSE Manager when bootstrapping new clients |
| CVE-2024-22034 | 5.5 MEDIUM | Crafted projects can overwrite special files in the .osc config directory |
| CVE-2023-32190 | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable | |
| CVE-2023-32188 | JWT token compromise can allow malicious actions including Remote Code Execution (RCE) |
No comments yet