Lucene search

K
cveGitHub_MCVE-2023-43791
HistoryNov 09, 2023 - 3:15 p.m.

CVE-2023-43791

2023-11-0915:15:08
CWE-200
GitHub_M
web.nvd.nist.gov
37
cve-2023-43791
label studio
data labeling
annotation tool
vulnerability
orm leak
privilege escalation
django super administrator
nvd
security advisory

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

20.5%

Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before 1.8.2, where a patch was introduced.

Affected configurations

Nvd
Vulners
Node
humansignallabel_studioRange<1.8.2
VendorProductVersionCPE
humansignallabel_studio*cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "HumanSignal",
    "product": "label-studio",
    "versions": [
      {
        "version": "<= 1.8.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

20.5%