CVE-2019-12274
HIGHRancher 1-2.2.3 - Privilege Escalation
Title source: llmDescription
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
Scores
CVSS v3
8.8
EPSS
0.0019
EPSS Percentile
40.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-862
CWE-668
Status
published
Affected Products (2)
suse/rancher
< 1.6.28
rancher/rancher
< 2.2.4Go
Timeline
Published
Jun 06, 2019
Tracked Since
Feb 18, 2026