First published: Wed Oct 11 2023(Updated: )
### Impact Malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. The best solution we see is therefore to check when resources are created or modified, that the resource name always starts with a character. ### Patches To be done, probably in v3.9 ### Workarounds None
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6 | <4.0.0 | 4.0.0 |
Vantage6 | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28635 is a vulnerability in the vantage6 privacy preserving federated learning infrastructure.
Users of vantage6 versions up to 3.9 are affected by CVE-2023-28635.
Malicious users may try to gain unauthorized access to resources they are not allowed to see by creating resources with integers as names.
To fix CVE-2023-28635, users should update to version 4.0.0 or newer of vantage6.
Yes, you can find references for CVE-2023-28635 on the GitHub release notes page, pull request page, and the security advisories page.