Skip to content

Some internal APIs in the Web application bypass ACLs

High
amousset published GHSA-xr7v-8q96-9j64 Sep 6, 2023

Package

rudder-server (rudder)

Affected versions

>= 7.3.0, < 7.3.5
< 7.2.10

Patched versions

7.3.5
7.2.10
rudder-webapp (rudder)
*
None

Description

Impact

Several APIs are affected:

  • Shared files API: /secure/api/sharedfile/* and /secure/api/resourceExplorer/*
  • API token management: /secure/api/apiaccounts/*
  • Event logs: /secure/api/eventlog/*
  • Completion: /secure/api/completion/*

Accessing these API requires a valid Rudder account, but no specific rights, meaning that a user with no or read-only rights can use them, and take control of the infrastructure (either by creating a privileges token, or chaining with GHSA-jjfq-p8xw-53g2).

Only actual user accounts are affected, not standalone API tokens.

Patches

  • #4957: Adds the required ACLs

Workarounds

None.

References

Severity

High
8.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N

CVE ID

No known CVE

Weaknesses