A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rancher | Rancher | * | 2.4.16 (excluding) |
Rancher | Rancher | 2.5.0 (including) | 2.5.9 (excluding) |