CVE-2023-30797
Python vulnerability analysis and mitigation

Overview

Netflix Lemur before version 1.3.2 contained a security vulnerability related to the use of insufficiently random values when generating default credentials and various security-sensitive configurations. The vulnerability was discovered by kjsman (Jinseo Kim) and was assigned CVE-2023-30797. The issue was publicly disclosed on February 28, 2023, and was patched in version 1.3.2 (Netflix Advisory, GitHub Advisory).

Technical details

The vulnerability is classified as CWE-330 (Use of Insufficiently Random Values) and received a CVSS v3.1 score of 7.5 (HIGH) with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The issue stemmed from the use of insecure random generation in both example configuration files and utility functions, affecting multiple security-sensitive components including Flask session secrets, token secrets, database encryption keys, and various runtime-generated credentials (VulnCheck Advisory, Netflix Advisory).

Impact

The vulnerability affected several critical security components including Flask session secrets (SECRET_KEY), Lemur token secrets (LEMUR_TOKEN_SECRET), database encryption keys (LEMUR_ENCRYPTION_KEYS), OAuth2 state token secrets, randomly generated passphrases for OpenSSL keystores, initial passwords for LDAP and Ping/OAuth2 users, OAuth2 nonces, and Verisign certificate enrollment challenges. The insufficient randomness in these components could potentially allow attackers to predict or guess the generated values (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in Lemur version 1.3.2. Users should upgrade to this version or later. For deployments using config secrets generated by Lemur's example config, these secrets should be rotated. While no direct workarounds are available, users who generated their config secrets in a more secure way are not known to be compromised but should still upgrade to ensure they receive fixes for runtime-generated secrets (Netflix Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22033HIGH8.6
  • PythonPython
  • label-studio
NoNoJan 12, 2026
CVE-2025-68472HIGH8.1
  • PythonPython
  • mindsdb
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22250LOW2.5
  • PythonPython
  • wlc
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management