Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-51663
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Hail authentication can be bypassed by changing email address
Source: NVD (National Vulnerability Database)
Vulnerability Description
Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user's domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `test@example.org`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用候选名称进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Hail 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hail是一款基于 Python 的开源通用数据分析工具,具有用于处理基因组数据的附加数据类型和方法。 Hail 0.2.127之前版本存在安全漏洞,该漏洞源于Hail依靠 ID 令牌中的 OpenID Connect (OIDC) 电子邮件地址来验证用户域的有效性,但由于用户可以更改其电子邮件地址,因此用户可以创建其他帐户并使用他们不应访问的集群中的资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
hail-ishail < 0.2.127 -
II. Public POCs for CVE-2023-51663
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-51663
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-51663

No comments yet


Leave a comment