Vulnerabilities > CVE-2023-41891 - Unspecified vulnerability in Flyte Flyteadmin
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
Vulnerable Configurations
References
- https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd
- https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd
- https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4
- https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4
- https://owasp.org/www-community/attacks/SQL_Injection#
- https://owasp.org/www-community/attacks/SQL_Injection#