CVE-2022-24856

FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this is not required for console anymore. A patch is available in FlyteConsole version 0.52.0. Disable FlyteConsole availability on the internet as a workaround.
Configurations

Configuration 1

cpe:2.3:a:flyte:flyte_console:*:*:*:*:*:*:*:*

Information

Published : 2022-05-17 04:15

Updated : 2022-05-26 10:07


NVD link : CVE-2022-24856

Mitre link : CVE-2022-24856

Products Affected
No products.
CWE
CWE-918

Server-Side Request Forgery (SSRF)