A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot
jail and gain root access to the Rancher container itself. In
production environments, further privilege escalation is possible based
on living off the land within the Rancher container itself. For the test
and development environments, based on a –privileged Docker container,
it is possible to escape the Docker container and gain execution access
on the host system.
This issue affects rancher: from 2.7.0 before 2.7.16, from 2.8.0 before 2.8.9, from 2.9.0 before 2.9.3.
References
Configurations
No configuration.
History
16 Apr 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 09:15
Updated : 2025-04-16 13:25
NVD link : CVE-2024-22036
Mitre link : CVE-2024-22036
CVE.ORG link : CVE-2024-22036
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management