Description
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
Published: 2023-10-30
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2800 FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
Github GHSA Github GHSA GHSA-r847-6w6h-r8g4 Flyte Admin SQL Injection in List Filters
History

No history.

Subscriptions

Flyte Flyteadmin
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-06T18:17:36.935Z

Reserved: 2023-09-04T16:31:48.225Z

Link: CVE-2023-41891

cve-icon Vulnrichment

Updated: 2024-08-02T19:09:49.215Z

cve-icon NVD

Status : Modified

Published: 2023-10-30T19:15:07.883

Modified: 2024-11-21T08:21:51.893

Link: CVE-2023-41891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses