Home » Database

AVID-2026-R1288

Description

Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio (CVE-2023-47117)

Details

Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django’s Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit f931d9d129 which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Reason for inclusion in AVID: CVE-2023-47117 describes a vulnerability in Label Studio (an open-source data labeling tool widely used in AI data pipelines) that can leak sensitive information via ORM-filter manipulation and even allow forging session tokens due to a hard-coded secret key. This is a software supply-chain risk for general-purpose AI systems because Label Studio is a component used in preparing data and managing ML workflows. The issue is a security vulnerability (information disclosure) in software used to build/deploy AI systems, with clear remediation in a specific commit and upgrade guidance. Evidence is provided in the CVE entry and advisory references.

References

Affected or Relevant Artifacts

  • Developer: HumanSignal
  • Deployer: HumanSignal
  • Artifact Details:
TypeName
Systemlabel-studio

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score7.5
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-200CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-11-13
  • Version: 0.3.3
  • AVID Entry