Overview
The vulnerability, identified as CVE-2023-51232, affects the Dagster web server versions up to 1.5.11. This Directory Traversal vulnerability allows remote attackers to access sensitive information by sending a specifically crafted request to the /logs endpoint. Given its potential for system compromise or data leakage, this vulnerability is of significant concern.
Vulnerability Summary
CVE ID: CVE-2023-51232
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
Product | Affected Versions
dagster-webserver | Up to 1.5.11
How the Exploit Works
The exploit works by taking advantage of a Directory Traversal vulnerability in the Dagster web server. Attackers send a specially crafted request to the /logs endpoint of the server. This request can potentially access any file whose name begins with a dot (‘.’), potentially revealing sensitive system or user information.
Conceptual Example Code
An example of how the vulnerability might be exploited could look like this:
GET /logs/../.sensitivefile HTTP/1.1
Host: vulnerable.example.com
In the above example, the attacker sends a GET request to the /logs endpoint, using the directory traversal sequence (../) to attempt to access a file in another directory. If successful, this request could return the contents of a sensitive file (in this case, .sensitivefile).
Mitigation Guidance
To mitigate this vulnerability, users are advised to apply the vendor patch as soon as it becomes available. In the interim, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) may provide temporary protection against attempts to exploit this vulnerability.
