Excessive permissions for ckan user
CVE-2023-32696

8.8HIGH

Key Information:

Vendor
ckan
Vendor
CVE Published:
30 May 2023

Summary

Prior to versions 2.9.9 and 2.10.1, the CKAN open-source data management system had security vulnerabilities that allowed the 'ckan' user, which operated with elevated privileges and had ownership of critical configuration files, to execute arbitrary code or escalate privileges under certain conditions. If certain flaws existed that permitted arbitrary file writing, an attacker could exploit these issues for malicious purposes. The vulnerabilities were addressed in CKAN version updates 2.9.9, 2.9.9-dev, 2.10.1, and 2.10.1-dev, which implemented essential patches to enhance security.

Affected Version(s)

ckan-docker-base < 2.9.9 < 2.9.9

ckan-docker-base >= 2.10.0, < 2.10.1 < 2.10.0, 2.10.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.