FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd | Patch Third Party Advisory |
https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4 | Third Party Advisory |
https://owasp.org/www-community/attacks/SQL_Injection# | Third Party Advisory |
https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd | Patch Third Party Advisory |
https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4 | Third Party Advisory |
https://owasp.org/www-community/attacks/SQL_Injection# | Third Party Advisory |
Configurations
History
21 Nov 2024, 08:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-30 19:15
Updated : 2024-11-21 08:21
NVD link : CVE-2023-41891
Mitre link : CVE-2023-41891
CVE.ORG link : CVE-2023-41891
JSON object : View
Products Affected
flyte
- flyteadmin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')