CVE-2023-22644

A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:suse:manager_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References
  • () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22644 -

15 Oct 2024, 14:15

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650', 'source': 'meissner@suse.de'}
  • {'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc', 'source': 'meissner@suse.de'}
  • () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32188 -
  • () https://github.com/neuvector/neuvector/security/advisories/GHSA-622h-h2p8-743x -
Summary (en) A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable. (en) A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
CWE CWE-287 CWE-1270

15 Oct 2024, 12:15

Type Values Removed Values Added
CWE CWE-532 CWE-287
Summary (en) A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue. (en) A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable.
References
  • {'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22649', 'source': 'meissner@suse.de'}
  • {'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr', 'source': 'meissner@suse.de'}
  • () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650 -
  • () https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc -

15 Oct 2024, 11:15

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22644', 'tags': ['Issue Tracking'], 'source': 'meissner@suse.de'}
  • () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22649 -
  • () https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr -
Summary (en) An Innsertion of Sensitive Information into Log File vulnerability in SUSE SUSE Manager Server Module 4.2 spacewalk-java, SUSE SUSE Manager Server Module 4.3 spacewalk-java causes sensitive information to be logged. This issue affects SUSE Manager Server Module 4.2: before 4.2.50-150300.3.66.5; SUSE Manager Server Module 4.3: before 4.3.58-150400.3.46.4. (en) A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue.

25 Sep 2023, 16:28

Type Values Removed Values Added
References (MISC) https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22644 - (MISC) https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22644 - Issue Tracking
First Time Suse
Suse manager Server
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:suse:manager_server:*:*:*:*:*:*:*:*

20 Sep 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-20 09:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22644

Mitre link : CVE-2023-22644

CVE.ORG link : CVE-2023-22644


JSON object : View

Products Affected

suse

  • manager_server
CWE
CWE-1270

Generation of Incorrect Security Tokens