Skip to content

Remote Code Execution (RCE) via Server Side Template Injection (SSTI) in Airbyte

High
wennergr published GHSA-4j3c-fgvx-xgqq Jul 8, 2024

Package

Airbyte

Affected versions

< 0.62.2

Patched versions

v0.62.2

Description

Summary

Airbyte connection builder docker image is vulnerable to RCE via SSTI which allows an authenticated remote attacker to execute arbitrary code on the server as the web server user. The connection builder is used to create and test new connectors. Sensitive information, such as credentials, could be exposed if a user tested a new connector on a compromised instance. The connection builder does not have access to any data processes.

This vulnerability was discovered by Mike Cole of Mantel Group https://mantelgroup.com.au/

Severity

High
8.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

CVE ID

CVE-2024-38363

Weaknesses

No CWEs

Credits