The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/flyteorg/flyteadmin/auth/config
to version 1.1.44 or higher.
github.com/flyteorg/flyteadmin/auth/config is a gRPC + REST Service written in golang and uses a RDBMs to store meta information and management information for Flyte Tasks and Workflows.
Affected versions of this package are vulnerable to Use of Hard-coded Credentials when enabling the default Flyte’s authorization server without changing the default clientid
hashes.
Note:
This vulnerability only applies to users who have not specified the ExternalAuthorizationServer
setting.
Using an external auth server automatically turns off this default configuration and is not susceptible to this vulnerability.
Users should manually set the staticClients
in the selfAuthServer
section of their configuration if they intend to rely on the admin’s internal auth server.