All the vulnerabilites related to HumanSignal - label-studio
cve-2023-43791
Vulnerability from cvelistv5
Published
2023-11-09 14:42
Modified
2024-09-03 18:46
Severity ?
EPSS score ?
Summary
Label Studio has Hardcoded Django `SECRET_KEY` that can be Abused to Forge Session Tokens
References
▼ | URL | Tags |
---|---|---|
https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m | x_refsource_CONFIRM | |
https://github.com/HumanSignal/label-studio/pull/4690 | x_refsource_MISC | |
https://github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b | x_refsource_MISC | |
https://github.com/HumanSignal/label-studio/releases/tag/1.8.2 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
HumanSignal | label-studio |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m" }, { "name": "https://github.com/HumanSignal/label-studio/pull/4690", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/pull/4690" }, { "name": "https://github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b" }, { "name": "https://github.com/HumanSignal/label-studio/releases/tag/1.8.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/releases/tag/1.8.2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-43791", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T18:43:34.308098Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T18:46:40.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "label-studio", "vendor": "HumanSignal", "versions": [ { "status": "affected", "version": "\u003c= 1.8.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before `1.8.2`, where a patch was introduced." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T14:42:40.750Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m" }, { "name": "https://github.com/HumanSignal/label-studio/pull/4690", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/pull/4690" }, { "name": "https://github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b" }, { "name": "https://github.com/HumanSignal/label-studio/releases/tag/1.8.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/releases/tag/1.8.2" } ], "source": { "advisory": "GHSA-f475-x83m-rx5m", "discovery": "UNKNOWN" }, "title": "Label Studio has Hardcoded Django `SECRET_KEY` that can be Abused to Forge Session Tokens" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-43791", "datePublished": "2023-11-09T14:42:40.750Z", "dateReserved": "2023-09-22T14:51:42.339Z", "dateUpdated": "2024-09-03T18:46:40.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-26152
Vulnerability from cvelistv5
Published
2024-02-22 21:52
Modified
2024-08-14 15:32
Severity ?
EPSS score ?
Summary
Label Studio vulnerable to Cross-site Scripting if `<Choices>` or `<Labels>` are used in labeling config
References
▼ | URL | Tags |
---|---|---|
https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg | x_refsource_CONFIRM | |
https://github.com/HumanSignal/label-studio/pull/5232 | x_refsource_MISC | |
https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8 | x_refsource_MISC | |
https://github.com/HumanSignal/label-studio/releases/tag/1.11.0 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
HumanSignal | label-studio |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:59:32.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg" }, { "name": "https://github.com/HumanSignal/label-studio/pull/5232", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/pull/5232" }, { "name": "https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8" }, { "name": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "label_studio", "vendor": "humansignal", "versions": [ { "lessThan": "1.11.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26152", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-23T14:32:49.819252Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T15:32:05.054Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "label-studio", "vendor": "HumanSignal", "versions": [ { "status": "affected", "version": "\u003c 1.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "### Summary\nOn all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a [`Choices`](https://labelstud.io/tags/choices) or [`Labels`](https://labelstud.io/tags/labels) tag, resulting in an XSS vulnerability.\n\n### Details\nNeed permission to use the \"data import\" function. This was reproduced on Label Studio 1.10.1.\n\n### PoC\n\n1. Create a project.\n![Create a project](https://github.com/HumanSignal/label-studio/assets/3943358/9b1536ad-feac-4238-a1bd-ca9b1b798673)\n\n2. Upload a file containing the payload using the \"Upload Files\" function.\n![2 Upload a file containing the payload using the Upload Files function](https://github.com/HumanSignal/label-studio/assets/3943358/26bb7af1-1cd2-408f-9adf-61e31a5b7328)\n![3 complete](https://github.com/HumanSignal/label-studio/assets/3943358/f2f62774-1fa6-4456-9e6f-8fa1ca0a2d2e)\n\nThe following are the contents of the files used in the PoC\n```\n{\n \"data\": {\n \"prompt\": \"labelstudio universe image\",\n \"images\": [\n {\n \"value\": \"id123#0\",\n \"style\": \"margin: 5px\",\n \"html\": \"\u003cimg width=\u0027400\u0027 src=\u0027https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif\u0027 onload=alert(document.cookie)\u003e\"\n }\n ]\n }\n}\n```\n\n3. Select the text-to-image generation labeling template of Ranking and scoring\n![3 Select the text-to-image generation labelling template for Ranking and scoring](https://github.com/HumanSignal/label-studio/assets/3943358/f227f49c-a718-4738-bc2a-807da4f97155)\n![5 save](https://github.com/HumanSignal/label-studio/assets/3943358/9b529f8a-8e99-4bb0-bdf6-bb7a95c9b75d)\n\n4. Select a task\n![4 Select a task](https://github.com/HumanSignal/label-studio/assets/3943358/71856b7a-2b1f-44ea-99ab-fc48bc20caa7)\n\n5. Check that the script is running\n![5 Check that the script is running](https://github.com/HumanSignal/label-studio/assets/3943358/e396ae7b-a591-4db7-afe9-5bab30b48cb9)\n\n### Impact\nMalicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-22T21:52:26.193Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg" }, { "name": "https://github.com/HumanSignal/label-studio/pull/5232", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/pull/5232" }, { "name": "https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8" }, { "name": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0" } ], "source": { "advisory": "GHSA-6xv9-957j-qfhg", "discovery": "UNKNOWN" }, "title": "Label Studio vulnerable to Cross-site Scripting if `\u003cChoices\u003e` or `\u003cLabels\u003e` are used in labeling config " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-26152", "datePublished": "2024-02-22T21:52:26.193Z", "dateReserved": "2024-02-14T17:40:03.690Z", "dateUpdated": "2024-08-14T15:32:05.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47116
Vulnerability from cvelistv5
Published
2024-01-31 16:21
Modified
2024-08-02 21:01
Severity ?
EPSS score ?
Summary
Label Studio SSRF on Import Bypassing `SSRF_PROTECTION_ENABLED` Protections
References
▼ | URL | Tags |
---|---|---|
https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r | x_refsource_CONFIRM | |
https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64 | x_refsource_MISC | |
https://github.com/HumanSignal/label-studio/releases/tag/1.11.0 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
HumanSignal | label-studio |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r" }, { "name": "https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64" }, { "name": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "label-studio", "vendor": "HumanSignal", "versions": [ { "status": "affected", "version": "\u003c 1.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Label Studio is a popular open source data labeling tool. The vulnerability affects all versions of Label Studio prior to 1.11.0 and was tested on version 1.8.2. Label Studio\u0027s SSRF protections that can be enabled by setting the `SSRF_PROTECTION_ENABLED` environment variable can be bypassed to access internal web servers. This is because the current SSRF validation is done by executing a single DNS lookup to verify that the IP address is not in an excluded subnet range. This protection can be bypassed by either using HTTP redirection or performing a DNS rebinding attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-31T16:21:50.793Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r" }, { "name": "https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64" }, { "name": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0" } ], "source": { "advisory": "GHSA-p59w-9gqw-wj8r", "discovery": "UNKNOWN" }, "title": "Label Studio SSRF on Import Bypassing `SSRF_PROTECTION_ENABLED` Protections" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-47116", "datePublished": "2024-01-31T16:21:50.793Z", "dateReserved": "2023-10-30T19:57:51.674Z", "dateUpdated": "2024-08-02T21:01:22.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23633
Vulnerability from cvelistv5
Published
2024-01-23 23:15
Modified
2024-11-13 15:24
Severity ?
EPSS score ?
Summary
Label Studio XSS Vulnerability on Data Import
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HumanSignal | label-studio |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r" }, { "name": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/api.py#L595C1-L616C62", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/api.py#L595C1-L616C62" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/uploader.py#L125C5-L146", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/uploader.py#L125C5-L146" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-23633", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T15:23:54.398837Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T15:24:01.901Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "label-studio", "vendor": "HumanSignal", "versions": [ { "status": "affected", "version": "\u003c 1.10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Label Studio, an open source data labeling tool had a remote import feature allowed users to import data from a remote web source, that was downloaded and could be viewed on the website. Prior to version 1.10.1, this feature could had been abused to download a HTML file that executed malicious JavaScript code in the context of the Label Studio website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image.\n\n`data_import/uploader.py` lines 125C5 through 146 showed that if a URL passed the server side request forgery verification checks, the contents of the file would be downloaded using the filename in the URL. The downloaded file path could then be retrieved by sending a request to `/api/projects/{project_id}/file-uploads?ids=[{download_id}]` where `{project_id}` was the ID of the project and `{download_id}` was the ID of the downloaded file. Once the downloaded file path was retrieved by the previous API endpoint, `data_import/api.py`lines 595C1 through 616C62 demonstrated that the `Content-Type` of the response was determined by the file extension, since `mimetypes.guess_type` guesses the `Content-Type` based on the file extension. Since the `Content-Type` was determined by the file extension of the downloaded file, an attacker could import in a `.html` file that would execute JavaScript when visited.\n\nVersion 1.10.1 contains a patch for this issue. Other remediation strategies are also available. For all user provided files that are downloaded by Label Studio, set the `Content-Security-Policy: sandbox;` response header when viewed on the site. The `sandbox` directive restricts a page\u0027s actions to prevent popups, execution of plugins and scripts and enforces a `same-origin` policy. Alternatively, restrict the allowed file extensions that may be downloaded." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T23:15:09.044Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r" }, { "name": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox", "tags": [ "x_refsource_MISC" ], "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/api.py#L595C1-L616C62", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/api.py#L595C1-L616C62" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/uploader.py#L125C5-L146", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.9.2.post0/label_studio/data_import/uploader.py#L125C5-L146" } ], "source": { "advisory": "GHSA-fq23-g58m-799r", "discovery": "UNKNOWN" }, "title": " Label Studio XSS Vulnerability on Data Import" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23633", "datePublished": "2024-01-23T23:15:09.044Z", "dateReserved": "2024-01-19T00:18:53.232Z", "dateUpdated": "2024-11-13T15:24:01.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47115
Vulnerability from cvelistv5
Published
2024-01-23 22:49
Modified
2024-08-02 21:01
Severity ?
EPSS score ?
Summary
Label Studio XSS Vulnerability on Avatar Upload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
HumanSignal | label-studio |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x" }, { "name": "https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3" }, { "name": "https://docs.djangoproject.com/en/4.2/ref/views/#serving-files-in-development", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.2/ref/views/#serving-files-in-development" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/functions.py#L18-L49", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/functions.py#L18-L49" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/urls.py#L25-L26", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/urls.py#L25-L26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "label-studio", "vendor": "HumanSignal", "versions": [ { "status": "affected", "version": "\u003c 1.9.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image.\n\nThe file `users/functions.py` lines 18-49 show that the only verification check is that the file is an image by extracting the dimensions from the file. Label Studio serves avatar images using Django\u0027s built-in `serve` view, which is not secure for production use according to Django\u0027s documentation. The issue with the Django `serve` view is that it determines the `Content-Type` of the response by the file extension in the URL path. Therefore, an attacker can upload an image that contains malicious HTML code and name the file with a `.html` extension to be rendered as a HTML page. The only file extension validation is performed on the client-side, which can be easily bypassed.\n\nVersion 1.9.2 fixes this issue. Other remediation strategies include validating the file extension on the server side, not in client-side code; removing the use of Django\u0027s `serve` view and implement a secure controller for viewing uploaded avatar images; saving file content in the database rather than on the filesystem to mitigate against other file related vulnerabilities; and avoiding trusting user controlled inputs." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T22:49:03.958Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x" }, { "name": "https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3" }, { "name": "https://docs.djangoproject.com/en/4.2/ref/views/#serving-files-in-development", "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/4.2/ref/views/#serving-files-in-development" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/functions.py#L18-L49", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/functions.py#L18-L49" }, { "name": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/urls.py#L25-L26", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/urls.py#L25-L26" } ], "source": { "advisory": "GHSA-q68h-xwq5-mm7x", "discovery": "UNKNOWN" }, "title": "Label Studio XSS Vulnerability on Avatar Upload" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-47115", "datePublished": "2024-01-23T22:49:03.958Z", "dateReserved": "2023-10-30T19:57:51.674Z", "dateUpdated": "2024-08-02T21:01:22.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47117
Vulnerability from cvelistv5
Published
2023-11-13 20:13
Modified
2024-08-02 21:01
Severity ?
EPSS score ?
Summary
Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio
References
▼ | URL | Tags |
---|---|---|
https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw | x_refsource_CONFIRM | |
https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
HumanSignal | label-studio |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw" }, { "name": "https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "label-studio", "vendor": "HumanSignal", "versions": [ { "status": "affected", "version": "\u003c 1.9.2post0" } ] } ], "descriptions": [ { "lang": "en", "value": "Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django\u0027s Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-13T20:13:32.396Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw" }, { "name": "https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c" } ], "source": { "advisory": "GHSA-6hjj-gq77-j4qw", "discovery": "UNKNOWN" }, "title": "Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-47117", "datePublished": "2023-11-13T20:13:32.396Z", "dateReserved": "2023-10-30T19:57:51.674Z", "dateUpdated": "2024-08-02T21:01:22.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }