We found results for “”
CVE-2022-32179
Date: October 29, 2022
Overview
In the Label-Studio application, v1.0.0 to v1.5.0post0, are vulnerable against blind SSRF. The “Import Data” feature allows importing data from publicly available URLs and does not enforce proper filtering of requests performed internally. This can be abused by authenticated attackers to send internal requests to the server.Details
A Blind Server Side Request Forgery (blind SSRF) in the Data Import module in Heartex - Label Studio. allows an authenticated user to access arbitrary files on the system. The “Import Data” feature allows importing data from publicly available URLs and does not enforce proper filtering of requests performed internally.PoC Details
1. Login as owner@yopmail.com:Owner@12 in browser by visiting URL http://192.168.2.179:8080/2. Go to create project and navigate to “Data Import” tab.
3. Start a python server by running the below command in host machine.
python3 -m http.server 9000
4. Enter the python server URL (http://0.0.0.0:9000/ssrf.txt) in the Dataset URL field and click on “Add URL” and save.
5. We see that the internal file gets uploaded and we receive a request on python server as well.
Affected Environments
Label-Studio versions v1.0.0 through v1.5.0post0Prevention
Upgrade to Label-Studio version 1.6.0Language: Python
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | Low |
User Interaction (UI): | None |
Scope (S): | Unchanged |
Confidentiality (C): | High |
Integrity (I): | None |
Availability (A): | None |