Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN006 _____________________________________________________________________ DATE : 16/01/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Rancher versions prior to 2.9.4, 2.10.0. ===================================================================== https://github.com/rancher/rancher/security/advisories/GHSA-2v2w-8v8c-wcm9 _____________________________________________________________________ Stored XSS in Rancher UI High pdellamore published GHSA-2v2w-8v8c-wcm9 Jan 14, 2025 Package github.com/rancher/rancher (Go) Affected versions >=2.9.0, <2.9.4 <2.10.0 Patched versions 2.9.4 2.10.0 Description Impact A vulnerability has been identified within Rancher UI that allows a malicious actor to perform a Stored XSS attack through the cluster description field. Please consult the associated MITRE ATT&CK - Technique - Drive-by Compromise for further information about this category of attack. Patches The fix introduces new changes in the directives responsible for sanitizing HTML code before rendering. We replaced the v-tooltip directive with the v-clean-tooltip directive. Patched versions include releases 2.9.4 and 2.10.0. Workarounds There are no workarounds for this issue. Users are recommended to upgrade, as soon as possible, to a version of /Rancher Manager which contains the fixes. Credits This issue was identified and reported by Bhavin Makwana from Workday’s Cyber Defence Team. For more information If you have any questions or comments about this advisory: Reach out to the SUSE Rancher Security team for security related inquiries. Open an issue in the Rancher repository. Verify with our support matrix and product support lifecycle. Severity High 8.9/ 10 CVSS v3 base metrics Attack vector Network Attack complexity Low Privileges required Low User interaction Required Scope Changed Confidentiality High Integrity High Availability Low CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L CVE ID CVE-2024-52281 Weaknesses CWE-20 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================