CKAN is vulnerable to session secret shared across instances using Docker images
CVE-2023-22746

8.6HIGH

Key Information:

Vendor
Ckan
Status
Vendor
CVE Published:
3 February 2023

Summary

CKAN, an open-source data management system, has a vulnerability in its Docker images where the default secret key is shared across multiple instances. If users do not define a custom secret key in their .env file, it could lead to authentication forgery, allowing attackers to craft fraudulent requests. This issue primarily affects the newer Docker images while the legacy images remain unaffected. Users are advised to configure their .env files appropriately to mitigate this risk.

Affected Version(s)

ckan >= 2.9.0, < 2.9.7 < 2.9.0, 2.9.7

ckan < 2.8.12 < 2.8.12

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-22746 : CKAN is vulnerable to session secret shared across instances using Docker images | SecurityVulnerability.io