Vulnerability Description
DataHub is an open-source metadata platform. In the event a system is using Java Authentication and Authorization Service (JAAS) authentication and that system is given a configuration which contains an error, the authentication for the system will fail open and allow an attacker to login using any username and password. The reason for this is that while an error is thrown in the `authenticateJaasUser` method it is swallowed without propagating the error. As a result of this issue unauthenticated users may gain access to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-081.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Datahub | Datahub | < 0.8.45 |
Related Weaknesses (CWE)
References
- https://github.com/datahub-project/datahub/blob/fdf4e48495f083314f59c414bcc7c260Issue Tracking
- https://github.com/datahub-project/datahub/security/advisories/GHSA-7wc6-p6c4-52Vendor Advisory
- https://github.com/datahub-project/datahub/blob/fdf4e48495f083314f59c414bcc7c260Issue Tracking
- https://github.com/datahub-project/datahub/security/advisories/GHSA-7wc6-p6c4-52Vendor Advisory
FAQ
What is CVE-2023-25561?
CVE-2023-25561 is a vulnerability with a CVSS score of 5.7 (MEDIUM). DataHub is an open-source metadata platform. In the event a system is using Java Authentication and Authorization Service (JAAS) authentication and that system is given a configuration which contains ...
How severe is CVE-2023-25561?
CVE-2023-25561 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25561?
Check the references section above for vendor advisories and patch information. Affected products include: Datahub Datahub.