
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-32198 is a high-severity vulnerability discovered in Steve (github.com/rancher/steve) affecting versions 0.2.0-0.2.1, 0.3.0-0.3.3, 0.4.0-0.4.4, and 0.5.0-0.5.13. The vulnerability stems from the software's failure to validate server certificates during TLS connections, making it susceptible to man-in-the-middle (MitM) attacks (GitHub Advisory).
The vulnerability occurs because Steve was using an insecure option by default that did not validate certificates presented by remote servers during TLS connections. This implementation flaw has a CVSS v3.1 base score of 8.1 (High) with the following metrics: Attack Vector: Network, Attack Complexity: High, Privileges Required: High, User Interaction: None, Scope: Changed, and Impact metrics (Confidentiality, Integrity, Availability) all rated as High (GitHub Advisory).
The vulnerability enables man-in-the-middle attacks against services using Steve. In Rancher deployments, where Steve is used as a dependency for the user interface to proxy requests to Kubernetes clusters, attackers with service creation permissions in Rancher's local cluster can potentially take over the UI and display their own interface to gather sensitive information. This can lead to cross-site scripting (XSS) attacks and credential theft through UI tampering (GitHub Advisory).
The vulnerability has been patched in Steve versions v0.2.1, v0.3.3, v0.4.4, and v0.5.13 by implementing proper server certificate verification based on Go's TLS settings. For users unable to upgrade, the recommended workaround is to ensure Steve only connects to trusted servers (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."