CKAN is an open-source data management system for powering data hubs and data portals. Starting in version 2.0.0 and prior to versions 2.9.10 and 2.10.3, when submitting a POST request to the `/dataset/new` endpoint (including either the auth cookie or the `Authorization` header) with a specially-crafted field, an attacker can create an out-of-memory error in the hosting server. To trigger this error, the attacker need to have permissions to create or edit datasets. This vulnerability has been patched in CKAN 2.10.3 and 2.9.10.
References
Link | Resource |
---|---|
https://github.com/ckan/ckan/commit/bd02018b65c5b81d7ede195d00d0fcbac3aa33be | Patch |
https://github.com/ckan/ckan/security/advisories/GHSA-7fgc-89cx-w8j5 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-12-13 21:15
Updated : 2023-12-18 19:56
NVD link : CVE-2023-50248
Mitre link : CVE-2023-50248
CVE.ORG link : CVE-2023-50248
JSON object : View
Products Affected
okfn
- ckan
CWE
CWE-130
Improper Handling of Length Parameter Inconsistency