CVE-2023-45822
Unsafe rego built-in allowed in Artifact Hub
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies. Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the `Open Policy Agent`. Policies are written using `rego` and their data files are expected to be json documents. By default, `rego` allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Artifact Hub es una aplicación basada en web que permite buscar, instalar y publicar paquetes y configuraciones para proyectos CNCF. Durante una auditoría de seguridad del código base de Artifact Hub, un investigador de seguridad identificó un error en el que se permitía el uso de un rego incorporado predeterminado no seguro al definir políticas de autorización. Artifact Hub incluye un mecanismo de autorización detallado que permite a las organizaciones definir qué acciones pueden realizar sus miembros. Se basa en políticas de autorización personalizables que aplica el "Open Policy Agent". Las políticas se escriben utilizando `rego` y se espera que sus archivos de datos sean documentos json. De forma predeterminada, `rego` permite que las políticas realicen solicitudes HTTP, de las cuales se puede abusar para enviar solicitudes a recursos internos y reenviar las respuestas a una entidad externa. En el contexto de Artifact Hub, esta capacidad debería haberse deshabilitado. Este problema se resolvió en la versión `1.16.0`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-10-13 CVE Reserved
- 2023-10-19 CVE Published
- 2024-09-12 CVE Updated
- 2024-11-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0 | Product | |
https://github.com/artifacthub/hub/security/advisories/GHSA-9pc8-m4vp-ggvf | Third Party Advisory | |
https://www.openpolicyagent.org | Mitigation | |
https://www.openpolicyagent.org/docs/latest/#rego | Mitigation |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Artifacthub Search vendor "Artifacthub" | Hub Search vendor "Artifacthub" for product "Hub" | < 1.16.0 Search vendor "Artifacthub" for product "Hub" and version " < 1.16.0" | - |
Affected
|