CVE-2023-32321
Python vulnerability analysis and mitigation

Overview

CKAN (Comprehensive Knowledge Archive Network) was found to contain multiple critical vulnerabilities identified as CVE-2023-32321, discovered and disclosed on May 24, 2023. The vulnerabilities affect CKAN versions before 2.9.9 and 2.10.1, impacting the open-source data management system used for powering data hubs and data portals (GitHub Advisory, NVD).

Technical details

The vulnerability consists of multiple components: an arbitrary file write vulnerability in resource_create and package_update actions (also accessible via package_create, package_revise, and package_patch), remote code execution through unsafe pickle loading via Beaker's session store when using the file session store backend, potential denial of service due to missing resource ID length validation, and unauthorized access to resources. The vulnerability has received a CVSS v3.1 base score of 9.8 CRITICAL with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerabilities allow attackers with permissions to create or edit a dataset to upload resources with specially crafted IDs, potentially leading to arbitrary file writes and remote code execution. Additionally, users with resource creation permissions can access and overwrite any resource in the system if they know the ID, even without proper access rights, leading to information disclosure and potential system compromise (GitHub Advisory).

Mitigation and workarounds

All vulnerabilities have been patched in CKAN versions 2.9.9 and 2.10.1. Users are strongly advised to upgrade to these versions. The patches for CKAN 2.9 can be applied to previous CKAN versions. Additionally, it is recommended to configure Beaker to use cookie-based sessions instead of file-based storage using specific configuration parameters in ckan.ini (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management