Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/treeverse/lakefs
  4. ›
  5. GMS-2023-5909

GMS-2023-5909: User with permission to write actions can impersonate another user when auth token is configured in environment variable

December 12, 2023

Impact

When lakeFS is configured with ALL of the following:

  • Configuration option auth.encrypt.secret_key passed through environment variable
  • Actions enabled via configuration option actions.enabled (default enabled)

then a user who can configure an action can impersonate any other user.

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

ANY ONE of these is sufficient to prevent the issue:

  • Do not pass auth.encrypt.secret_key through an environment variable.

For instance, Kubernetes users can generate the entire configuration as a secret and mount that. This is described here.

  • Disable actions.
  • Limit users allowed to configure actions.

References

  • github.com/advisories/GHSA-26hr-q2wp-rvc5
  • github.com/treeverse/lakeFS/security/advisories/GHSA-26hr-q2wp-rvc5

Code Behaviors & Features

Detect and mitigate GMS-2023-5909 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.3.1

Fixed versions

  • v1.3.1

Solution

Upgrade to version 1.3.1 or above.

Source file

go/github.com/treeverse/lakefs/GMS-2023-5909.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:35 +0000.