Miggo Logo

CVE-2022-36551: Heartex - Label Studio Community Edition vulnerable to SSRF in the Data Import module

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.83031%
Published
10/4/2022
Updated
9/27/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
label-studiopip< 1.6.01.6.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub patch shows the vulnerability was in the Data Import module's URL handling. The commit adds a critical check for 'file://' prefixes in load_tasks() - this directly corresponds to the CVE description about accessing local files via URL imports. The absence of this validation in versions <1.6.0 allowed attackers to read arbitrary files through crafted URLs, enabled by the function's failure to restrict file protocol access while processing import requests.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* S*rv*r Si** R*qu*st *or**ry (SSR*) in t** **t* Import mo*ul* in ***rt*x - L***l Stu*io *ommunity **ition v*rsions *.*.* *n* **rli*r *llows *n *ut**nti**t** us*r to ****ss *r*itr*ry *il*s on t** syst*m. *urt**rmor*, s*l*-r**istr*tion is *n**l** *y *

Reasoning

T** *it*u* p*t** s*ows t** vuln*r**ility w*s in t** **t* Import mo*ul*'s URL **n*lin*. T** *ommit ***s * *riti**l ****k *or '*il*://' pr**ix*s in `lo**_t*sks()` - t*is *ir**tly *orr*spon*s to t** *V* **s*ription **out ****ssin* lo**l *il*s vi* URL im