![]() This issue may lead to Remote Code Execution (RCE) in the worst case. Specifically, if any of the id_token claims value start with the prefix, pac4j considers the value to be a serialized Java object and will deserialize it. ![]() The processing of the `id_token` is done in an unsafe manner which is not properly accounted for by the DataHub frontend. When the DataHub frontend is configured to authenticate via SSO, it will leverage the pac4j library. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-081.ĭataHub is an open-source metadata platform. There are no known workarounds for this issue. As a result of this issue unauthenticated users may gain access to the system. The reason for this is that while an error is thrown in the `authenticateJaasUser` method it is swallowed without propagating the error. In the event a system is using Java Authentication and Authorization Service (JAAS) authentication and that system is given a configuration which contains an error, the authentication for the system will fail open and allow an attacker to login using any username and password. DataHub is an open-source metadata platform.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |