Rancher Backup Operator pod's logs leak S3 tokens
Description
A vulnerability has been identified within the Rancher Backup Operator, resulting in the leakage of S3 tokens (both accessKey and secretKey) into the rancher-backup-operator pod's logs.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Rancher Backup Operator logs S3 accessKey and secretKey, exposing AWS credentials in the pod's logs under default debug levels.
Vulnerability
Overview
The Rancher Backup Operator, used for backing up and restoring Rancher on Kubernetes clusters, contains a vulnerability that causes S3 credentials (accessKey and secretKey) to be written into the operator pod's logs. The S3 accessKey is logged even with default settings (trace: false, debug: false), while the secretKey appears when trace or debug is enabled [3]. This leakage stems from insufficient redaction of sensitive information in log output.
Exploitation
Prerequisites
No special privileges are needed beyond access to the rancher-backup-operator pod logs. An attacker with read access to the cluster logs (e.g., through kubectl logs, log aggregation systems, or compromised monitoring tools) can retrieve the exposed credentials. The attack surface is broadened if logs are exported to external storage [3].
Impact
Successful exploitation allows an attacker to obtain valid S3 accessKey and secretKey tokens. With these credentials, an attacker could access the S3 bucket used for Rancher backups, potentially reading, modifying, or deleting backup data. This could lead to data breach, backup tampering, or disruption of disaster recovery capabilities [1][3].
Mitigation
Patched versions (108.0.1+up9.0.1, 107.1.2+up8.1.2, 106.0.6+up7.0.5, 105.0.6+up6.0.3) apply redaction to prevent credential leakage [3]. Users should upgrade immediately and rotate affected S3 tokens. For environments that cannot upgrade, setting both debug and trace to false reduces exposure, but does not eliminate the accessKey leak [3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/rancher/backup-restore-operatorGo | >= 9.0.0, < 9.0.1 | 9.0.1 |
github.com/rancher/backup-restore-operatorGo | >= 8.0.0, < 8.1.2 | 8.1.2 |
github.com/rancher/backup-restore-operatorGo | >= 7.0.0, < 7.0.5 | 7.0.5 |
github.com/rancher/backup-restore-operatorGo | >= 6.0.0, < 6.0.3 | 6.0.3 |
Affected products
2- SUSE/Rancherv5Range: 9.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.