DataHub is an open-source metadata platform. In versions of DataHub prior to 0.8.45 Session cookies are only cleared on new sign-in events and not on logout events. Any authentication checks using the `AuthUtils.hasValidSessionCookie()` method could be bypassed by using a cookie from a logged out session, as a result any logged out session cookie may be accepted as valid and therefore lead to an authentication bypass to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-083.
References
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78 - Issue Tracking | |
References | () https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.9 |
Information
Published : 2023-02-11 01:23
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25562
Mitre link : CVE-2023-25562
CVE.ORG link : CVE-2023-25562
JSON object : View
Products Affected
datahub_project
- datahub
CWE
CWE-613
Insufficient Session Expiration