{"id":"CVE-2024-52282","details":"A Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SUSE rancher allowing any users with GET\n access to the Rancher Manager Apps Catalog to read any sensitive information that are \ncontained within the Apps’ values. Additionally, the same information \nleaks into auditing logs when the audit level is set to equal or above \n2.\n\nThis issue affects rancher: from 2.8.0 before 2.8.10, from 2.9.0 before 2.9.4.","aliases":["GHSA-9c5p-35gj-jqp4","GO-2024-3280"],"modified":"2026-04-09T10:27:32.026487Z","published":"2025-04-11T11:15:41.630Z","related":["openSUSE-SU-2024:14519-1"],"references":[{"type":"ADVISORY","url":"https://github.com/rancher/rancher/security/advisories/GHSA-9c5p-35gj-jqp4"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-52282"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rancher/rancher","events":[{"introduced":"72f58378bf03122a9651c9bd3b4c143a57e8fdaa"},{"fixed":"84a48ffbb30cfbb4a794585db8fbdae10bf83915"},{"introduced":"9e0cc54e7e3a924cf0ed5c5d4db0a6e53805c75e"},{"fixed":"4ec728e8aae3e51c86cf599d1618c555fd806ce8"}],"database_specific":{"versions":[{"introduced":"2.8.0"},{"fixed":"2.8.10"},{"introduced":"2.9.0"},{"fixed":"2.9.4"}]}}],"versions":["v2.8.0","v2.8.0-rc5","v2.8.10-alpha1","v2.8.10-alpha2","v2.8.10-rc1","v2.8.10-rc2","v2.8.3","v2.8.3-alpha1","v2.8.3-alpha2","v2.8.3-rc1","v2.8.3-rc2","v2.8.3-rc3","v2.8.3-rc4","v2.8.3-rc5","v2.8.3-rc6","v2.8.3-rc7","v2.8.3-rc8","v2.8.4","v2.8.4-alpha1","v2.8.4-rc1","v2.8.4-rc2","v2.8.4-rc3","v2.8.4-rc4","v2.8.4-rc5","v2.8.6","v2.8.6-alpha1","v2.8.6-alpha2","v2.8.6-alpha3","v2.8.6-alpha4","v2.8.6-alpha5","v2.8.6-alpha6","v2.8.6-rc1","v2.8.6-rc2","v2.8.6-rc3","v2.8.6-rc4","v2.8.7","v2.8.7-rc1","v2.8.7-rc10","v2.8.7-rc2","v2.8.7-rc3","v2.8.7-rc4","v2.8.7-rc5","v2.8.7-rc6","v2.8.7-rc7","v2.8.7-rc8","v2.8.7-rc9","v2.8.8","v2.8.8-alpha1","v2.8.8-alpha2","v2.8.8-rc1","v2.8.9","v2.8.9-alpha1","v2.8.9-alpha10","v2.8.9-alpha2","v2.8.9-alpha3","v2.8.9-alpha4","v2.8.9-alpha5","v2.8.9-alpha6","v2.8.9-alpha8","v2.8.9-alpha9","v2.8.9-rc1","v2.8.9-rc2","v2.9.0","v2.9.0-rc6","v2.9.1","v2.9.1-alpha1","v2.9.1-alpha2","v2.9.1-rc1","v2.9.1-rc2","v2.9.1-rc3","v2.9.1-rc4","v2.9.1-rc5","v2.9.1-rc6","v2.9.2","v2.9.2-alpha1","v2.9.2-alpha2","v2.9.2-alpha3","v2.9.2-alpha4","v2.9.2-alpha5","v2.9.2-alpha6","v2.9.2-alpha7","v2.9.2-rc1","v2.9.3","v2.9.3-alpha1","v2.9.3-alpha2","v2.9.3-alpha3","v2.9.3-alpha4","v2.9.3-alpha5","v2.9.3-alpha6","v2.9.3-alpha7","v2.9.3-rc1","v2.9.3-rc2","v2.9.4-alpha1","v2.9.4-alpha2","v2.9.4-alpha3","v2.9.4-alpha4","v2.9.4-alpha5","v2.9.4-rc1","v2.9.4-rc2","v2.9.4-rc3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-52282.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N"}]}