CVE-2023-32321

CKAN is an open-source data management system for powering data hubs and data portals. Multiple vulnerabilities have been discovered in Ckan which may lead to remote code execution. An arbitrary file write in `resource_create` and `package_update` actions, using the `ResourceUploader` object. Also reachable via `package_create`, `package_revise`, and `package_patch` via calls to `package_update`. Remote code execution via unsafe pickle loading, via Beaker's session store when configured to use the file session store backend. Potential DOS due to lack of a length check on the resource id. Information disclosure: A user with permission to create a resource can access any other resource on the system if they know the id, even if they don't have access to it. Resource overwrite: A user with permission to create a resource can overwrite any resource if they know the id, even if they don't have access to it. A user with permissions to create or edit a dataset can upload a resource with a specially crafted id to write the uploaded file in an arbitrary location. This can be leveraged to Remote Code Execution via Beaker's insecure pickle loading. All the above listed vulnerabilities have been fixed in CKAN 2.9.9 and CKAN 2.10.1. Users are advised to upgrade. There are no known workarounds for these issues.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*
cpe:2.3:a:okfn:ckan:2.10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst - Release Notes () https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst - Release Notes
References () https://github.com/ckan/ckan/security/advisories/GHSA-446m-hmmm-hm8m - Vendor Advisory () https://github.com/ckan/ckan/security/advisories/GHSA-446m-hmmm-hm8m - Vendor Advisory

03 Jun 2023, 03:57

Type Values Removed Values Added
CPE cpe:2.3:a:okfn:ckan:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Okfn
Okfn ckan
CWE NVD-CWE-noinfo
References (MISC) https://github.com/ckan/ckan/security/advisories/GHSA-446m-hmmm-hm8m - (MISC) https://github.com/ckan/ckan/security/advisories/GHSA-446m-hmmm-hm8m - Vendor Advisory
References (MISC) https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst - (MISC) https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst - Release Notes

02 Jun 2023, 16:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst -

26 May 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-26 23:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32321

Mitre link : CVE-2023-32321

CVE.ORG link : CVE-2023-32321


JSON object : View

Products Affected

okfn

  • ckan
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo