CVE-2023-32199

4.3 MEDIUM

📋 TL;DR

CVE-2023-32199 is an improper preservation of permissions vulnerability in Rancher Manager where users retain cluster access after their custom GlobalRole or binding is removed. This affects Rancher deployments where custom GlobalRoles with wildcard permissions (* on *) have been created and then removed. Only administrators managing custom GlobalRoles are affected.

💻 Affected Systems

Products:
  • Rancher Manager
Versions: All versions prior to 2.7.9 and 2.6.14
Operating Systems: All platforms running Rancher
Default Config Vulnerable: ✅ No
Notes: Only affects deployments where custom GlobalRoles with wildcard permissions (* on * for resources or non-resource URLs) have been created and subsequently removed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Former administrators maintain unauthorized access to all clusters, potentially allowing data exfiltration, configuration changes, or privilege escalation across the entire Rancher-managed environment.

🟠

Likely Case

Users who should have lost administrative privileges continue to have limited access to clusters they previously managed, creating compliance violations and potential security gaps.

🟢

If Mitigated

With proper access reviews and monitoring, unauthorized access would be quickly detected and remediated before significant damage occurs.

🌐 Internet-Facing: LOW - This vulnerability requires authenticated access to Rancher Manager and specific administrative actions to create the vulnerable configuration.
🏢 Internal Only: MEDIUM - While exploitation requires insider access, the persistence of unauthorized permissions creates significant compliance and security risks within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires: 1) Administrative access to create custom GlobalRoles, 2) Creation of vulnerable wildcard permissions, 3) Subsequent removal of those roles/bindings while users retain access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Rancher v2.7.9 and v2.6.14

Vendor Advisory: https://github.com/rancher/rancher/security/advisories/GHSA-j4vr-pcmw-hx59

Restart Required: No

Instructions:

1. Backup your Rancher configuration. 2. Upgrade to Rancher v2.7.9 (for v2.7.x) or v2.6.14 (for v2.6.x). 3. Verify the upgrade completed successfully. 4. Review and clean up any lingering permissions from previously removed GlobalRoles.

🔧 Temporary Workarounds

Manual Permission Cleanup

all

Manually review and remove any lingering permissions from users who had custom GlobalRoles with wildcard permissions removed

kubectl get clusterrolebindings -A | grep -i 'custom'
kubectl get rolebindings -A | grep -i 'custom'
# Review output and remove any bindings that should no longer exist

🧯 If You Can't Patch

  • Implement strict access reviews and regularly audit all GlobalRoles and bindings to identify unauthorized permissions
  • Enable detailed audit logging for all permission changes and monitor for unexpected access patterns

🔍 How to Verify

Check if Vulnerable:

Check if you have Rancher versions prior to 2.7.9 or 2.6.14 AND have created/removed custom GlobalRoles with wildcard (* on *) permissions.

Check Version:

kubectl get pods -n cattle-system -l app=rancher -o jsonpath='{.items[*].spec.containers[*].image}' | grep -o 'rancher/rancher:[^ ]*'

Verify Fix Applied:

After upgrading, verify version is 2.7.9+ or 2.6.14+, then test by creating/removing a custom GlobalRole with wildcard permissions and confirming access is properly revoked.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing users accessing clusters after their GlobalRole/binding removal
  • Audit logs of permission changes showing role removal without access revocation

Network Indicators:

  • Unexpected API calls from users who should no longer have access

SIEM Query:

source="rancher-audit-logs" (event="GlobalRole.delete" OR event="GlobalRoleBinding.delete") AND user_access_after_removal=true

🔗 References

📤 Share & Export