First published: Fri Feb 10 2023(Updated: )
DataHub is an open-source metadata platform. In the event a system is using Java Authentication and Authorization Service (JAAS) authentication and that system is given a configuration which contains an error, the authentication for the system will fail open and allow an attacker to login using any username and password. The reason for this is that while an error is thrown in the `authenticateJaasUser` method it is swallowed without propagating the error. As a result of this issue unauthenticated users may gain access to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-081.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Datahub | <0.8.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25561 is a vulnerability in the DataHub open-source metadata platform that allows an attacker to bypass authentication.
CVE-2023-25561 has a severity rating of 9.8, which is considered critical.
CVE-2023-25561 affects DataHub versions up to and excluding 0.8.45.
To fix CVE-2023-25561, update DataHub to version 0.8.45 or newer.
You can find more information about CVE-2023-25561 at the following references: [link1], [link2]