Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4h45-jpvh-6p5j: Rancher affected by unauthenticated Denial of Service

Impact

A vulnerability has been identified within Rancher Manager in which it did not enforce request body size limits on certain public (unauthenticated) and authenticated API endpoints. This allows a malicious user to exploit this by sending excessively large payloads, which are fully loaded into memory during processing. This could result in:

  • Denial of Service (DoS): The server process may crash or become unresponsive when memory consumption exceeds available resources.
  • Unauthenticated and authenticated exploitation: While the issue was initially observed in unauthenticated /v3-public/* endpoints, the absence of request body size limits also affected several authenticated APIs, broadening the potential attack surface. It’s worth noting that other areas in Rancher do implement safeguards: requests proxied to Kubernetes APIs are subject to built-in size limits enforced by the Kubernetes API server itself, and Norman-based endpoints parse input with predefined size caps. However, the absence of similar protections in other Rancher APIs increased the risk of denial-of-service (DoS) scenarios in certain contexts.

By sending large binary or text payloads to vulnerable endpoints, a malicious actor could disrupt Rancher’s availability, impacting both administrative and user operations across managed clusters.

Please consult the associated MITRE ATT&CK - Technique - Network Denial of Service for further information about this category of attack.

Patches

This vulnerability is addressed by adding a default limit of 1MiB and a setting in case this value needs to be increased.

Patched versions of Rancher include releases v2.12.1, v2.11.5, v2.10.9 and v2.9.12.

Workarounds

If you can’t upgrade to a fixed version, please make sure that you are manually setting the request body size limits. For example, using nginx-ingress controller and only allowing requests via the ingress. For reference on how to configure the limit manually, please consult the Knowledge Base.

References

If you have any questions or comments about this advisory:

ghsa
#vulnerability#ios#dos#git#kubernetes#nginx#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-58259

Rancher affected by unauthenticated Denial of Service

High severity GitHub Reviewed Published Aug 28, 2025 in rancher/rancher • Updated Aug 29, 2025

Package

gomod github.com/rancher/rancher (Go)

Affected versions

>= 2.12.0, < 2.12.1

>= 2.11.0, < 2.11.5

>= 2.10.0, < 2.10.9

>= 2.9.0, < 2.9.11

< 0.0.0-20250813072957-aee95d4e2a41

Patched versions

2.12.1

2.11.5

2.10.9

2.9.11

0.0.0-20250813072957-aee95d4e2a41

Impact

A vulnerability has been identified within Rancher Manager in which it did not enforce request body size limits on certain public (unauthenticated) and authenticated API endpoints. This allows a malicious user to exploit this by sending excessively large payloads, which are fully loaded into memory during processing. This could result in:

  • Denial of Service (DoS): The server process may crash or become unresponsive when memory consumption exceeds available resources.
  • Unauthenticated and authenticated exploitation: While the issue was initially observed in unauthenticated /v3-public/* endpoints, the absence of request body size limits also affected several authenticated APIs, broadening the potential attack surface. It’s worth noting that other areas in Rancher do implement safeguards: requests proxied to Kubernetes APIs are subject to built-in size limits enforced by the Kubernetes API server itself, and Norman-based endpoints parse input with predefined size caps. However, the absence of similar protections in other Rancher APIs increased the risk of denial-of-service (DoS) scenarios in certain contexts.

By sending large binary or text payloads to vulnerable endpoints, a malicious actor could disrupt Rancher’s availability, impacting both administrative and user operations across managed clusters.

Please consult the associated MITRE ATT&CK - Technique - Network Denial of Service for further information about this category of attack.

Patches

This vulnerability is addressed by adding a default limit of 1MiB and a setting in case this value needs to be increased.

Patched versions of Rancher include releases v2.12.1, v2.11.5, v2.10.9 and v2.9.12.

Workarounds

If you can’t upgrade to a fixed version, please make sure that you are manually setting the request body size limits. For example, using nginx-ingress controller and only allowing requests via the ingress. For reference on how to configure the limit manually, please consult the Knowledge Base.

References

If you have any questions or comments about this advisory:

  • Reach out to the SUSE Rancher Security team for security related inquiries.
  • Open an issue in the Rancher repository.
  • Verify with our support matrix and product support lifecycle.

References

  • GHSA-4h45-jpvh-6p5j
  • rancher/rancher@aee95d4
  • https://github.com/rancher/rancher/releases/tag/v2.10.9
  • https://github.com/rancher/rancher/releases/tag/v2.11.5
  • https://github.com/rancher/rancher/releases/tag/v2.12.1
  • https://github.com/rancher/rancher/releases/tag/v2.9.11

Published to the GitHub Advisory Database

Aug 29, 2025

Last updated

Aug 29, 2025

ghsa: Latest News

GHSA-w469-hj2f-jpr5: Harness Allows Arbitrary File Write in Gitness LFS server