FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-10-30T18:01:17.453Z

Updated: 2024-09-06T18:17:36.935Z

Reserved: 2023-09-04T16:31:48.225Z

Link: CVE-2023-41891

cve-icon Vulnrichment

Updated: 2024-08-02T19:09:49.215Z

cve-icon NVD

Status : Analyzed

Published: 2023-10-30T19:15:07.883

Modified: 2023-11-07T23:26:21.683

Link: CVE-2023-41891

cve-icon Redhat

No data.