AVID-2026-R1288
Description
Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio (CVE-2023-47117)
Details
Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django’s Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit f931d9d129 which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Reason for inclusion in AVID: CVE-2023-47117 describes a vulnerability in Label Studio (an open-source data labeling tool widely used in AI data pipelines) that can leak sensitive information via ORM-filter manipulation and even allow forging session tokens due to a hard-coded secret key. This is a software supply-chain risk for general-purpose AI systems because Label Studio is a component used in preparing data and managing ML workflows. The issue is a security vulnerability (information disclosure) in software used to build/deploy AI systems, with clear remediation in a specific commit and upgrade guidance. Evidence is provided in the CVE entry and advisory references.
References
- NVD entry
- https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw
- https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c
Affected or Relevant Artifacts
- Developer: HumanSignal
- Deployer: HumanSignal
- Artifact Details:
| Type | Name |
|---|---|
| System | label-studio |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Base Score | 7.5 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | NONE |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-200 | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2023-11-13
- Version: 0.3.3
- AVID Entry