漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Rancher Extensions have arbitrary file access via path traversal
Vulnerability Description
A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code. * Write to /var/lib/rancher/ to tamper with cluster state. * If hostPath volumes are mounted, write to the host node filesystem. * Use this issue to chain with other attack vectors.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Vulnerability Type
路径遍历:’…/…//’
Vulnerability Title
Rancher 安全漏洞
Vulnerability Description
Rancher是美国Rancher开源的一个开源容器管理平台,专为在生产环境中部署容器的组织而构建。 Rancher存在安全漏洞,该漏洞源于Extensions中compressedEndpoint字段存在路径遍历,可能导致恶意UI扩展注入代码、覆盖Rancher二进制文件或配置、篡改集群状态、写入主机节点文件系统以及与其他攻击向量链式利用。
CVSS Information
N/A
Vulnerability Type
N/A