CVE-2023-41891
CVSS V2 None
CVSS V3 None
Description
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
Overview
- CVE ID
- CVE-2023-41891
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-10-30T18:01:17.453Z
- Last Modified Date
- 2023-10-30T18:01:17.453Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4 | x_refsource_CONFIRM |
https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd | x_refsource_MISC |
https://owasp.org/www-community/attacks/SQL_Injection# | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-41891 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41891 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 03:21:19 | Added to TrackCVE |