CVE-2023-25562

DataHub is an open-source metadata platform. In versions of DataHub prior to 0.8.45 Session cookies are only cleared on new sign-in events and not on logout events. Any authentication checks using the `AuthUtils.hasValidSessionCookie()` method could be bypassed by using a cookie from a logged out session, as a result any logged out session cookie may be accepted as valid and therefore lead to an authentication bypass to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-083.
Configurations

Configuration 1 (hide)

cpe:2.3:a:datahub_project:datahub:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78 - Issue Tracking () https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/datahub-frontend/app/auth/AuthUtils.java#L78 - Issue Tracking
References () https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj - Vendor Advisory () https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj - Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 6.9

Information

Published : 2023-02-11 01:23

Updated : 2024-11-21 07:49


NVD link : CVE-2023-25562

Mitre link : CVE-2023-25562

CVE.ORG link : CVE-2023-25562


JSON object : View

Products Affected

datahub_project

  • datahub
CWE
CWE-613

Insufficient Session Expiration