Rancher Recreates Default User With Known Password Despite Deletion
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jun 10, 2024
Package
Affected versions
>= 2.0.0, <= 2.0.13
>= 2.1.0, <= 2.1.8
>= 2.2.0, < 2.2.2
Patched versions
2.2.2
Description
Published by the National Vulnerability Database
Jul 30, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Apr 24, 2024
Last updated
Jun 10, 2024
An issue was discovered that affects the following versions of Rancher: v2.0.0 through v2.0.13, v2.1.0 through v2.1.8, and v2.2.0 through 2.2.1. When Rancher starts for the first time, it creates a default admin user with a well-known password. After initial setup, the Rancher administrator may choose to delete this default admin user. If Rancher is restarted, the default admin user will be recreated with the well-known default password. An attacker could exploit this by logging in with the default admin credentials. This can be mitigated by deactivating the default admin user rather than completing deleting them.
References