When lakeFS is configured with ALL of the following:
auth.encrypt.secret_key
passed through environment variableactions.enabled
(default enabled)then a user who can configure an action can impersonate any other user.
Has the problem been patched? What versions should users upgrade to?
ANY ONE of these is sufficient to prevent the issue:
Do not pass auth.encrypt.secret_key
through an environment variable.
For instance, Kubernetes users can generate the entire configuration as a secret and mount that. This is described here.
{ "nvd_published_at": null, "cwe_ids": [], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-12-12T00:58:04Z" }