Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31145
HistoryJul 13, 2022 - 8:30 p.m.

CVE-2022-31145 Insufficient AccessToken Expiration Check in FlyteAdmin

2022-07-1320:30:12
CWE-613
GitHub_M
www.cve.org
4
flyteadmin
accesstoken expiration
authentication server
access tokens
id tokens
oauth2
authorization server
workaround
rotating signing keys
repository
open sessions
new tokens
ingress url

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

32.3%

FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the master branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.

CNA Affected

[
  {
    "product": "flyteadmin",
    "vendor": "flyteorg",
    "versions": [
      {
        "status": "affected",
        "version": "<= 1.1.30"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

32.3%

Related for CVELIST:CVE-2022-31145