CVE-2023-32696

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32696
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32696.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32696
Aliases
  • GHSA-c74x-xfvr-x5wg
Published
2023-05-30T18:33:53Z
Modified
2025-11-09T15:07:46.668803Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Excessive permissions for ckan user
Details

CKAN is an open-source data management system for powering data hubs and data portals. Prior to versions 2.9.9 and 2.10.1, the ckan user (equivalent to www-data) owned code and configuration files in the docker container and the ckan user had the permissions to use sudo. These issues allowed for code execution or privilege escalation if an arbitrary file write bug was available. Versions 2.9.9, 2.9.9-dev, 2.10.1, and 2.10.1-dev contain a patch.

Database specific
{
    "cwe_ids": [
        "CWE-269"
    ]
}
References

Affected packages

Git / github.com/ckan/ckan

Affected ranges

Type
GIT
Repo
https://github.com/ckan/ckan
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

ckan-1.*

ckan-1.3.3b
ckan-1.4
ckan-1.4.1
ckan-1.4.2
ckan-1.4.3
ckan-1.5
ckan-1.5.1
ckan-1.6
ckan-1.7

ckan-2.*

ckan-2.9.0
ckan-2.9.1
ckan-2.9.2
ckan-2.9.3
ckan-2.9.4
ckan-2.9.5
ckan-2.9.6
ckan-2.9.7
ckan-2.9.8

demo-0.*

demo-0.1
demo-0.2

Git / github.com/ckan/ckan-docker-base

Affected ranges

Type
GIT
Repo
https://github.com/ckan/ckan-docker-base
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed