{"id":"GO-2022-1043","summary":"Hardcoded hashed password in github.com/flyteorg/flyteadmin","details":"Default authorization server's configuration settings contain a known hardcoded hashed password.\n\nUsers who enable auth but do not override this setting may unknowingly allow public traffic in by way of this default password with attackers effectively impersonating propeller.","aliases":["CVE-2022-39273","GHSA-67x4-qr35-qvrm"],"modified":"2024-05-20T16:03:47Z","published":"2022-10-31T17:09:13Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2022-1043","review_status":"REVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-67x4-qr35-qvrm"},{"type":"FIX","url":"https://github.com/flyteorg/flyteadmin/pull/478"},{"type":"WEB","url":"https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server"}],"affected":[{"package":{"name":"github.com/flyteorg/flyteadmin","ecosystem":"Go","purl":"pkg:golang/github.com/flyteorg/flyteadmin"},"ranges":[{"type":"SEMVER","events":[{"introduced":"1.0.0"},{"fixed":"1.1.44"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/flyteorg/flyteadmin/auth/config"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-1043.json"}}],"schema_version":"1.7.3"}