Skip to content

Default Privileges allow for high level operations for low privileged users

High
RyanHolstien published GHSA-x3v6-r479-m4xv Jan 10, 2024

Package

docker datahub-frontend, datahub-gms (Docker)

Affected versions

< 0.12.0

Patched versions

0.12.1

Description

Summary

A low privileged user could remove a user, edit group members, or edit another user's profile information.

Details

The default privileges gave too many broad permissions to low privileged users. These have been constrained to prevent abuse in later versions.

PoC

As a low privileged user:

  • use the removeUser GraphQL API to delete a user
  • edit the group members of a privileged group, adding the low privileged user allowing privilege escalation
  • modify another user's email or other personal information

Impact

Can result in privilege escalation for lower privileged users up to admin privileges, potentially, if a group with admin privileges exists. May not impact instances that have modified default privileges.

Credit

Dor Konis - GE Vernova
Amit Laish - GE Vernova

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2024-22409

Weaknesses

No CWEs

Credits