DataHub is an open-source metadata platform. In the event a system is using Java Authentication and Authorization Service (JAAS) authentication and that system is given a configuration which contains an error, the authentication for the system will fail open and allow an attacker to login using any username and password. The reason for this is that while an error is thrown in the `authenticateJaasUser` method it is swallowed without propagating the error. As a result of this issue unauthenticated users may gain access to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-081.
References
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
References | () https://github.com/datahub-project/datahub/blob/fdf4e48495f083314f59c414bcc7c2601633a2b8/datahub-frontend/app/security/AuthenticationManager.java#L26 - Issue Tracking | |
References | () https://github.com/datahub-project/datahub/security/advisories/GHSA-7wc6-p6c4-522c - Vendor Advisory |
21 Feb 2023, 20:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-11 01:23
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25561
Mitre link : CVE-2023-25561
CVE.ORG link : CVE-2023-25561
JSON object : View
Products Affected
datahub_project
- datahub
CWE
CWE-755
Improper Handling of Exceptional Conditions