漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
DataHub OIDC REDIRECT_URL Cookie Deserialization Vulnerability
Vulnerability Description
DataHub is an open-source metadata platform. Prior to 1.5.0.3, The DataHub frontend (datahub-frontend-react) deserializes attacker-controlled Java objects from the REDIRECT_URL HTTP cookie during the OIDC callback flow, with no integrity protection (no HMAC, no encryption). This is a Deserialization of Untrusted Data vulnerability (CWE-502) affecting the GET /callback/oidc endpoint. Successful exploitation requires a valid user account in the configured OIDC identity provider This vulnerability is fixed in 1.5.0.3.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
可信数据的反序列化
Vulnerability Title
DataHub 代码问题漏洞
Vulnerability Description
DataHub是datahub-project开源的一个现代数据栈的元数据平台。 DataHub 1.5.0.3之前版本存在代码问题漏洞,该漏洞源于DataHub前端在OIDC回调流程中从REDIRECT_URL HTTP cookie反序列化攻击者控制的Java对象,且无完整性保护,导致反序列化不可信数据漏洞。
CVSS Information
N/A
Vulnerability Type
N/A