CVE-2022-31145
vulnerability analysis and mitigation

Overview

FlyteAdmin, prior to version 1.1.29, contained a vulnerability that allowed authenticated users using an external identity provider to continue using Access Tokens and ID Tokens even after their expiration. The vulnerability was discovered and disclosed in July 2022, identified as CVE-2022-31145. Users who use FlyteAdmin as the OAuth2 Authorization Server were unaffected by this issue (GitHub Advisory).

Technical details

The vulnerability stemmed from insufficient validation of access token expiration in the authentication process. The issue was specifically related to the token verification logic in the external identity provider setup, where the system failed to properly verify the expiration status of Access Tokens and ID Tokens (GitHub PR).

Impact

The vulnerability allowed authenticated users to continue using expired Access Tokens and ID Tokens when using an external identity provider, potentially compromising the security of the authentication system. This could lead to unauthorized access to resources after token expiration (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in FlyteAdmin version 1.1.29. For systems unable to immediately update, recommended workarounds included: rotating signing keys immediately to invalidate all open sessions and force users to obtain new tokens, continuing key rotation until FlyteAdmin could be upgraded, and hiding the FlyteAdmin deployment ingress URL from the internet (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management