Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/steve
  4. ›
  5. CVE-2024-52280

CVE-2024-52280: github.com/rancher/steve's users can issue watch commands for arbitrary resources

November 20, 2024 (updated April 11, 2025)

A vulnerability has been discovered in Steve API (Kubernetes API Translator) in which users can watch resources they are not allowed to access, when they have at least some generic permissions on the type. For example, a user who can get a single secret in a single namespace can get all secrets in every namespace.

During a watch request for a single ID, the following occurs:

  • In the case of a watch request for a single resource, Steve API will return a partition with the requested resource in it. In other cases, it will check the user’s access when constructing partitions.
  • When a watch request for a single resource is issued, instead of using a client which impersonates the user making the request, Steve API will use the admin client, which can read all resources.

This allows any requester to see the contents of any object such as secret keys, signing certificates, API tokens.

Please consult the associated MITRE ATT&CK - Technique - Valid Accounts and MITRE ATT&CK - Technique - Container and Resource Discovery for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2024-52280
  • github.com/advisories/GHSA-j5hq-5jcr-xwx7
  • github.com/rancher/steve
  • github.com/rancher/steve/commit/2175e090fe4b1e603a54e1cdc5148a2b1c11b4d9
  • github.com/rancher/steve/security/advisories/GHSA-j5hq-5jcr-xwx7
  • nvd.nist.gov/vuln/detail/CVE-2024-52280
  • pkg.go.dev/vuln/GO-2024-3281

Code Behaviors & Features

Detect and mitigate CVE-2024-52280 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20241029132712-2175e090fe4b

Fixed versions

  • 0.0.0-20241029132712-2175e090fe4b

Solution

Upgrade to version 0.0.0-20241029132712-2175e090fe4b or above.

Impact 7.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-287: Improper Authentication

Source file

go/github.com/rancher/steve/CVE-2024-52280.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:07 +0000.