CVE-2024-43784

5.7 MEDIUM

📋 TL;DR

This vulnerability in lakeFS allows privilege inheritance when reusing usernames. When a deleted user's username is reused for a new account, the new user automatically inherits all credentials and permissions from the deleted user. This affects all lakeFS deployments where user accounts have been deleted and usernames are reused.

💻 Affected Systems

Products:
  • lakeFS
Versions: All versions before 1.33.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where user accounts have been deleted. Fresh installations without user deletions are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could create an account with a previously deleted admin username, gaining full administrative access to the lakeFS instance and all associated object storage data.

🟠

Likely Case

Accidental privilege escalation when administrators reuse usernames for new employees or service accounts, potentially granting unintended access to sensitive data.

🟢

If Mitigated

With proper username management policies and monitoring, the risk is limited to accidental exposure rather than malicious exploitation.

🌐 Internet-Facing: MEDIUM - If lakeFS is exposed to the internet, attackers could attempt to guess previously used usernames, but requires knowledge of deleted user accounts.
🏢 Internal Only: MEDIUM - Internal users with knowledge of organizational username patterns could exploit this, but requires existing user deletion and reuse.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create new user accounts and knowledge of previously deleted usernames.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.33.0

Vendor Advisory: https://github.com/treeverse/lakeFS/security/advisories/GHSA-hh33-46q4-hwm2

Restart Required: Yes

Instructions:

1. Backup your lakeFS configuration and data. 2. Stop the lakeFS service. 3. Upgrade to version 1.33.0 using your package manager or deployment method. 4. Restart the lakeFS service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Username Reuse Prevention

all

Implement a policy to never reuse usernames for new accounts after deletion.

🧯 If You Can't Patch

  • Implement strict username management policy prohibiting reuse of any deleted usernames
  • Audit all user accounts and ensure no usernames have been reused since initial deployment

🔍 How to Verify

Check if Vulnerable:

Check if your lakeFS version is below 1.33.0 and if any user accounts have been deleted since deployment.

Check Version:

lakefs version

Verify Fix Applied:

After upgrading to 1.33.0, attempt to create a user with a previously deleted username and verify credentials are not inherited.

📡 Detection & Monitoring

Log Indicators:

  • User creation events with previously deleted usernames
  • Unexpected privilege assignments to new users

Network Indicators:

  • Unusual API calls from newly created user accounts

SIEM Query:

source="lakefs" AND (event="user_created" OR event="user_deleted") | stats count by username

🔗 References

📤 Share & Export