First published: Fri Feb 10 2023(Updated: )
DataHub is an open-source metadata platform. In versions of DataHub prior to 0.8.45 Session cookies are only cleared on new sign-in events and not on logout events. Any authentication checks using the `AuthUtils.hasValidSessionCookie()` method could be bypassed by using a cookie from a logged out session, as a result any logged out session cookie may be accepted as valid and therefore lead to an authentication bypass to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-083.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Datahub | <0.8.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25562 is a vulnerability in the DataHub open-source metadata platform where session cookies are not cleared on logout events, allowing authentication bypass using a logged out session cookie.
The severity of CVE-2023-25562 is critical with a CVSS score of 9.8.
DataHub versions prior to 0.8.45 are affected by CVE-2023-25562 due to the issue with session cookie clearance on logout events.
CVE-2023-25562 can be exploited by using a logged out session cookie to bypass authentication checks in the DataHub platform.
To mitigate CVE-2023-25562, it is recommended to upgrade to DataHub version 0.8.45 or later where the session cookie clearance issue has been fixed.