In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Authentication vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/milvus-io/milvus/pkg/util to version 2.4.24, 2.5.21, 2.6.0-rc1 or higher.
Affected versions of this package are vulnerable to Improper Authentication through the Milvus Proxy component, which skips the source ID check. An attacker can gain full administrative access to the cluster, allowing them to read, modify, or delete data and perform privileged operations by sending specially crafted requests that bypass authentication mechanisms.
This vulnerability can be mitigated by removing the sourceID header from all incoming requests at the gateway, API gateway, or load balancer level before they reach the affected component.