First published: Tue Nov 14 2023(Updated: )
### Impact A node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. Relevant node code [here](https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268) This impacts all servers that are breached by an expert user ### Patches Fixed in v4.1.2 ### Workarounds None
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6-server | <4.1.2 | 4.1.2 |
Vantage6 Vantage6 | <4.1.2 | |
Vantage6 Vantage6 | =4.1.2-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-47631.
The severity of CVE-2023-47631 is high with a CVSS score of 7.2.
CVE-2023-47631 affects vantage6 by allowing a node to accept non-whitelisted algorithms from a malicious server.
Versions up to but excluding 4.1.2 of vantage6-server are affected by CVE-2023-47631.
Yes, the remedy for CVE-2023-47631 is to update to version 4.1.2 of vantage6-server.