cve/2023/CVE-2023-43791.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-43791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43791)
![](https://img.shields.io/static/v1?label=Product&message=label-studio&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.8.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before `1.8.2`, where a patch was introduced.
### POC
#### Reference
- https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m
#### Github
- https://github.com/elttam/publications