CVE-2023-43791: Label Studio has Hardcoded Django `SECRET_KEY` that can be Abused to Forge Session Tokens
(updated )
Below is the code snippet of the Django settings file at label_studio/core/settings/base.py
.
References
- github.com/HumanSignal/label-studio
- github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b
- github.com/HumanSignal/label-studio/pull/4690
- github.com/HumanSignal/label-studio/releases/tag/1.8.2
- github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m
- github.com/advisories/GHSA-f475-x83m-rx5m
- github.com/pypa/advisory-database/tree/main/vulns/label-studio/PYSEC-2023-274.yaml
- nvd.nist.gov/vuln/detail/CVE-2023-43791
Detect and mitigate CVE-2023-43791 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →