Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-43791 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Privilege Escalation in Label Studio. <br>πŸ“‰ **Consequences**: Low-privilege users can escalate to **Django Super Admin**. Full system control is lost. πŸ“‰

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-200 (Information Exposure). <br>πŸ” **Flaw**: Improper access control allows unauthorized privilege elevation. The system fails to restrict admin-level actions. ⚠️

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: HumanSignal (Heartex). <br>πŸ“¦ **Product**: Label Studio. <br>🚫 **Affected**: Versions **before 1.8.2**. If you are running 1.8.1 or older, you are vulnerable. πŸ“‰

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Hackers Can**: <br>1. Escalate from **Low Privilege** ➑️ **Super Admin**. <br>2. Access all data. <br>3. Modify configurations. <br>4. Execute arbitrary code via admin panel. πŸ“‰

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. <br>βœ… **Auth**: None required (PR:N). <br>βœ… **UI**: No user interaction needed (UI:N). <br>βœ… **Network**: Remote (AV:N). <br>⚑ Easy to exploit remotely. πŸ“‰

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: No specific PoC code in data. <br>πŸ”— **Fix**: Patch available in PR #4690. <br>⚠️ **Risk**: High CVSS (9.8). Wild exploitation likely due to simplicity. πŸ“‰

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Check Label Studio version. <br>2. Verify if < 1.8.2. <br>3. Scan for admin endpoints accessible by normal users. <br>4. Review Django permissions. πŸ“‰

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fixed?**: **YES**. <br>βœ… **Patch**: Version **1.8.2** released. <br>πŸ”— **Commit**: 3d06c5131c15600621e08b06f07d976887cde81b. <br>πŸ“₯ **Action**: Upgrade immediately. πŸ“‰

Q9What if no patch? (Workaround)

🚧 **No Patch?**: <br>1. Restrict network access to Label Studio. <br>2. Disable public registration. <br>3. Monitor admin logs for suspicious activity. <br>4. Isolate the instance. πŸ“‰

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>πŸ“Š **CVSS**: 9.8 (High). <br>⚑ **Priority**: Patch NOW. <br>πŸ›‘ Remote, no auth, full admin access. Do not delay. πŸ“‰