A Server Side Request Forgery (SSRF) in the Data Import module in Heartex – Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF. This issue is fixed in version 1.6.0.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-36551
- https://github.com/heartexlabs/label-studio/pull/2840
- http://heartex.com
- http://labelstud.io
- https://github.com/heartexlabs/label-studio/commit/501142cb815ac964b0c600c491885b67386870c2
- https://github.com/heartexlabs/label-studio/releases/tag/1.6.0
- https://github.com/pypa/advisory-database/tree/main/vulns/label-studio/PYSEC-2022-300.yaml
- https://github.com/advisories/GHSA-pc6f-259w-w3j6