Use of Hard-coded Credentials Affecting github.com/flyteorg/flyteadmin/auth/config package, versions <1.1.44


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMFLYTEORGFLYTEADMINAUTHCONFIG-3040499
  • published6 Oct 2022
  • disclosed5 Oct 2022
  • creditUnknown

Introduced: 5 Oct 2022

CVE-2022-39273  (opens in a new tab)
CWE-798  (opens in a new tab)

How to fix?

Upgrade github.com/flyteorg/flyteadmin/auth/config to version 1.1.44 or higher.

Overview

github.com/flyteorg/flyteadmin/auth/config is a gRPC + REST Service written in golang and uses a RDBMs to store meta information and management information for Flyte Tasks and Workflows.

Affected versions of this package are vulnerable to Use of Hard-coded Credentials when enabling the default Flyte’s authorization server without changing the default clientid hashes.

Note: This vulnerability only applies to users who have not specified the ExternalAuthorizationServer setting. Using an external auth server automatically turns off this default configuration and is not susceptible to this vulnerability.

Workaround:

Users should manually set the staticClients in the selfAuthServer section of their configuration if they intend to rely on the admin’s internal auth server.

CVSS Scores

version 3.1