CVE-2023-43791: Label Studio has Hardcoded Django `SECRET_KEY` that can be Abused to Forge Session Tokens
Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before 1.8.2
, where a patch was introduced.
References
- github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b
- github.com/HumanSignal/label-studio/pull/4690
- github.com/HumanSignal/label-studio/releases/tag/1.8.2
- github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m
- github.com/advisories/GHSA-f475-x83m-rx5m
- nvd.nist.gov/vuln/detail/CVE-2023-43791
Detect and mitigate CVE-2023-43791 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →