Learn about CVE-2022-39366 affecting DataHub metadata service. Find out how an attacker can impersonate users with this critical vulnerability. Take immediate steps and update to version 0.8.45 for mitigation.
DataHub missing JWT signature check vulnerability in DataHub metadata service.
Understanding CVE-2022-39366
This CVE affects DataHub, an open-source metadata platform, allowing an attacker to impersonate any user if Metadata Service authentication is enabled.
What is CVE-2022-39366?
Prior to version 0.8.45, the
StatelessTokenService
of DataHub's Metadata service does not verify the signature of JWT tokens. This oversight enables unauthorized access to DataHub instances.
The Impact of CVE-2022-39366
The vulnerability allows attackers to connect to DataHub as any user, potentially leading to an authentication bypass. Version 0.8.45 contains a patch to address this issue with no known workarounds.
Technical Details of CVE-2022-39366
Vulnerability Description
The vulnerability arises due to the
StatelessTokenService
utilizing the parse
method of io.jsonwebtoken.JwtParser
, which omits cryptographic token signature verification.
Affected Systems and Versions
DataHub versions prior to 0.8.45 are impacted by this vulnerability.
Exploitation Mechanism
Attackers can exploit the lack of JWT signature verification to gain unauthorized access to DataHub instances.
Mitigation and Prevention
Immediate Steps to Take
Users are advised to update to version 0.8.45 or later to mitigate the vulnerability.
Long-Term Security Practices
Implement strict access controls and regularly update DataHub to prevent security breaches.
Patching and Updates
Refer to the official DataHub release (v0.8.45) for the patched version addressing this vulnerability.