A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| label-studio | pip | < 1.6.0 | 1.6.0 |
Do you use label-studio? You're affected.
Severity & Risk
Recommended Action
Patch available
Update label-studio to version 1.6.0
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF. This issue is fixed in version 1.6.0.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N References
- heartex.com
- labelstud.io
- packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html
- github.com/advisories/GHSA-pc6f-259w-w3j6
- github.com/heartexlabs/label-studio/commit/501142cb815ac964b0c600c491885b67386870c2
- github.com/heartexlabs/label-studio/pull/2840
- github.com/heartexlabs/label-studio/releases/tag/1.6.0
- github.com/pypa/advisory-database/tree/main/vulns/label-studio/PYSEC-2022-300.yaml
- nvd.nist.gov/vuln/detail/CVE-2022-36551