Lucene search

K
cve[email protected]CVE-2024-28253
HistoryMar 15, 2024 - 8:15 p.m.

CVE-2024-28253

2024-03-1520:15:09
CWE-94
web.nvd.nist.gov
53
openmetadata
discovery
observability
governance
cve-2024-28253
remote code execution
metadata repository
lineage
team collaboration
vulnerability
upgrade
nvd
ghsl-2023-252
authorization check
codeql
put request
policyresource
entityresource

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

9.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.2%

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. CompiledRule::validateExpression is also called from PolicyRepository.prepare. prepare() is called from EntityRepository.prepareInternal() which, in turn, gets called from EntityResource.createOrUpdate(). Note that even though there is an authorization check (authorizer.authorize()), it gets called after prepareInternal() gets called and therefore after the SpEL expression has been evaluated. In order to reach this method, an attacker can send a PUT request to /api/v1/policies which gets handled by PolicyResource.createOrUpdate(). This vulnerability was discovered with the help of CodeQL’s Expression language injection (Spring) query and is also tracked as GHSL-2023-252. This issue may lead to Remote Code Execution and has been addressed in version 1.3.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Vulners
Node
open-metadataopenmetadataRange<1.3.1

CNA Affected

[
  {
    "vendor": "open-metadata",
    "product": "OpenMetadata",
    "versions": [
      {
        "version": "< 1.3.1",
        "status": "affected"
      }
    ]
  }
]

References

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

9.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.2%

Related for CVE-2024-28253