First published: Fri Feb 10 2023(Updated: )
DataHub is an open-source metadata platform. The DataHub frontend acts as a proxy able to forward any REST or GraphQL requests to the backend. The goal of this proxy is to perform authentication if needed and forward HTTP requests to the DataHub Metadata Store (GMS). It has been discovered that the proxy does not adequately construct the URL when forwarding data to GMS, allowing external users to reroute requests from the DataHub Frontend to any arbitrary hosts. As a result attackers may be able to reroute a request from originating from the frontend proxy to any other server and return the result. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-076.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Datahub | <0.8.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25557 is a critical vulnerability in DataHub, an open-source metadata platform.
The severity of CVE-2023-25557 is 9.1 (Critical).
DataHub version 0.8.45 and prior are affected by CVE-2023-25557.
CVE-2023-25557 allows remote attackers to perform unauthorized actions on DataHub.
To fix CVE-2023-25557, update DataHub to a version beyond 0.8.45.