FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd | Patch Third Party Advisory |
https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4 | Third Party Advisory |
https://owasp.org/www-community/attacks/SQL_Injection# | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-30T18:01:17.453Z
Updated: 2023-10-30T18:01:17.453Z
Reserved: 2023-09-04T16:31:48.225Z
Link: CVE-2023-41891
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-30T19:15:07.883
Modified: 2023-11-07T23:26:21.683
Link: CVE-2023-41891
JSON object: View
Redhat Information
No data.
CWE