First published: Thu Mar 20 2025(Updated: )
A CORS (Cross-Origin Resource Sharing) misconfiguration in prefecthq/prefect prior to version 3.0.3 allows unauthorized domains to access sensitive data. This vulnerability can lead to unauthorized access to the database, resulting in potential data leaks, loss of confidentiality, service disruption, and data integrity risks.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Prefect | ||
pip/prefect | <2.20.17 | 2.20.17 |
pip/prefect | >=3.0.0rc1<3.0.3 | 3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8183 is classified as a high severity vulnerability due to its potential for unauthorized access to sensitive data.
To mitigate CVE-2024-8183, review and update your CORS configurations to ensure only trusted domains have access.
CVE-2024-8183 enables CORS misconfiguration attacks, allowing unauthorized domains to access sensitive data.
CVE-2024-8183 affects Prefect version 2.20.2 and possibly earlier versions that share the same CORS misconfiguration.
Yes, CVE-2024-8183 can lead to data leaks and loss of confidentiality due to unauthorized domain access.