Skip to content

Exposure of SSH credentials in Rancher/Fleet

Low severity GitHub Reviewed Published Apr 15, 2022 in rancher/rancher • Updated Jan 7, 2023

Package

gomod github.com/rancher/rancher (Go)

Affected versions

< 2.5.13
>= 2.6.0, < 2.6.4

Patched versions

2.5.13
2.6.4

Description

Impact

This vulnerability only affects customers using Fleet for continuous delivery with authenticated Git and/or Helm repositories.

A security vulnerability (CVE-2022-29810) was discovered in go-getter library in versions prior to v1.5.11 that exposes SSH private keys in base64 format due to a failure in redacting such information from error messages. The vulnerable version of this library is used in Rancher through Fleet in versions of Fleet prior to v0.3.9. This issue affects Rancher versions 2.5.0 up to and including 2.5.12 and from 2.6.0 up to and including 2.6.3.

When Git and/or Helm authentication is configured in Fleet and Fleet is used to deploy a git repo through Continuous Delivery, the affected go-getter version will expose the configured SSH private key secret if Fleet fails to download the git repo due to a misconfigured URL. The exposed SSH key is logged in base64 format as a query parameter together with the git URL. The credentials can be seen in Rancher UI and in Fleet's deployment pod logs.

Patches

Patched versions include releases 2.5.13, 2.6.4 and later versions.

Workarounds

There is not a direct mitigation besides upgrading to the patched Rancher versions. Until you are able to upgrade, limit access in Rancher to trusted users and carefully validate the URLs you are using are correct. Please note that the SSH key might still be compromised in valid URLs if the service goes down or a connection error happens when pulling from the repos.

Note: If you believe that SSH keys might have been exposed in your environment, it's highly advised to rotate them.

Credits

This issue was found and reported by Dagan Henderson from Raft Engineering.

For more information

If you have any questions or comments about this advisory:

References

@macedogm macedogm published to rancher/rancher Apr 15, 2022
Published to the GitHub Advisory Database Apr 27, 2022
Reviewed Apr 27, 2022
Last updated Jan 7, 2023

Severity

Low

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-wm2r-rp98-8pmh

Source code

github.com/rancher/rancher
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.