Vulnerability Description
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Flyte | Flyteadmin | < 1.1.124 |
Related Weaknesses (CWE)
References
- https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74PatchThird Party Advisory
- https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4Third Party Advisory
- https://owasp.org/www-community/attacks/SQL_Injection#Third Party Advisory
- https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74PatchThird Party Advisory
- https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4Third Party Advisory
- https://owasp.org/www-community/attacks/SQL_Injection#Third Party Advisory
FAQ
What is CVE-2023-41891?
CVE-2023-41891 is a vulnerability with a CVSS score of 3.5 (LOW). FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where...
How severe is CVE-2023-41891?
CVE-2023-41891 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-41891?
Check the references section above for vendor advisories and patch information. Affected products include: Flyte Flyteadmin.