First published: Tue Nov 14 2023(Updated: )
### Impact A node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. Relevant node code [here](https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268) This impacts all servers that are breached by an expert user ### Patches Fixed in v4.1.2 ### Workarounds None
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6-server | <4.1.2 | 4.1.2 |
Vantage6 Vantage6 | <4.1.2 | |
Vantage6 Vantage6 | =4.1.2-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-47631.
The severity of CVE-2023-47631 is high with a CVSS score of 7.2.
CVE-2023-47631 affects vantage6 by allowing a node to accept non-whitelisted algorithms from a malicious server.
Versions up to but excluding 4.1.2 of vantage6-server are affected by CVE-2023-47631.
Yes, the remedy for CVE-2023-47631 is to update to version 4.1.2 of vantage6-server.