CVE-2022-31145: CWE-613: Insufficient Session Expiration in flyteorg flyteadmin
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.
AI Analysis
Technical Summary
CVE-2022-31145 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting flyteorg's FlyteAdmin control plane, specifically versions 1.1.30 and earlier. FlyteAdmin is responsible for managing entities and administering workflow executions within the Flyte platform. The vulnerability arises when FlyteAdmin is configured to use an external identity provider for authentication. In this scenario, authenticated users can continue to use Access Tokens and ID Tokens even after their expiration time has passed. This means that session tokens remain valid beyond their intended lifespan, potentially allowing unauthorized continued access if tokens are compromised or if users do not log out properly. Notably, this issue does not affect users who use FlyteAdmin as the OAuth2 Authorization Server itself, as token expiration is properly enforced in that configuration. The root cause is insufficient session expiration enforcement, which violates best practices for session management and token lifecycle. A patch addressing this issue is available on the master branch of the FlyteAdmin repository. As an interim mitigation, rotating signing keys immediately invalidates all existing tokens, forcing users to obtain new tokens and effectively terminating lingering sessions. It is recommended to continue rotating keys until the patched FlyteAdmin version is deployed. Additionally, restricting FlyteAdmin ingress URLs from exposure to the internet reduces the attack surface. There are no known exploits in the wild reported for this vulnerability as of the publication date (July 13, 2022).
Potential Impact
For European organizations using FlyteAdmin versions 1.1.30 or earlier with external identity providers, this vulnerability can lead to prolonged unauthorized access if tokens are compromised or sessions are not properly terminated. Attackers or malicious insiders could exploit expired tokens to maintain access to workflow management and execution controls, potentially leading to unauthorized data access, manipulation of workflows, or disruption of automated processes. This undermines confidentiality and integrity of sensitive operational data and may impact availability if workflows are maliciously altered or halted. The impact is particularly significant for organizations relying on FlyteAdmin for critical data processing pipelines, such as financial institutions, healthcare providers, and research organizations. However, since exploitation requires possession of valid tokens and the vulnerability does not allow token forgery or privilege escalation, the risk is somewhat mitigated by existing authentication controls. The lack of known exploits suggests limited active targeting, but the potential for session hijacking or token replay attacks remains a concern. The vulnerability does not affect users relying on FlyteAdmin as the OAuth2 Authorization Server, reducing the scope of impact for some deployments.
Mitigation Recommendations
1. Upgrade FlyteAdmin to a version beyond 1.1.30 that includes the official patch addressing token expiration enforcement. 2. Immediately rotate signing keys used for token validation to invalidate all existing tokens and force re-authentication. Continue key rotation until the patched version is deployed. 3. Restrict FlyteAdmin ingress URLs from exposure to the public internet by implementing network segmentation, firewall rules, or VPN access controls to limit access to trusted internal networks. 4. Monitor authentication logs for unusual token reuse or prolonged session activity beyond normal token lifetimes. 5. Review and tighten session management policies in the external identity provider to ensure tokens are revoked or invalidated promptly upon logout or expiration. 6. Educate users and administrators on the importance of logging out and not sharing tokens. 7. Implement additional multi-factor authentication (MFA) where possible to reduce risk from token compromise. 8. Conduct regular security assessments and penetration testing focused on session management and token handling within FlyteAdmin deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Finland
CVE-2022-31145: CWE-613: Insufficient Session Expiration in flyteorg flyteadmin
Description
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.
AI-Powered Analysis
Technical Analysis
CVE-2022-31145 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting flyteorg's FlyteAdmin control plane, specifically versions 1.1.30 and earlier. FlyteAdmin is responsible for managing entities and administering workflow executions within the Flyte platform. The vulnerability arises when FlyteAdmin is configured to use an external identity provider for authentication. In this scenario, authenticated users can continue to use Access Tokens and ID Tokens even after their expiration time has passed. This means that session tokens remain valid beyond their intended lifespan, potentially allowing unauthorized continued access if tokens are compromised or if users do not log out properly. Notably, this issue does not affect users who use FlyteAdmin as the OAuth2 Authorization Server itself, as token expiration is properly enforced in that configuration. The root cause is insufficient session expiration enforcement, which violates best practices for session management and token lifecycle. A patch addressing this issue is available on the master branch of the FlyteAdmin repository. As an interim mitigation, rotating signing keys immediately invalidates all existing tokens, forcing users to obtain new tokens and effectively terminating lingering sessions. It is recommended to continue rotating keys until the patched FlyteAdmin version is deployed. Additionally, restricting FlyteAdmin ingress URLs from exposure to the internet reduces the attack surface. There are no known exploits in the wild reported for this vulnerability as of the publication date (July 13, 2022).
Potential Impact
For European organizations using FlyteAdmin versions 1.1.30 or earlier with external identity providers, this vulnerability can lead to prolonged unauthorized access if tokens are compromised or sessions are not properly terminated. Attackers or malicious insiders could exploit expired tokens to maintain access to workflow management and execution controls, potentially leading to unauthorized data access, manipulation of workflows, or disruption of automated processes. This undermines confidentiality and integrity of sensitive operational data and may impact availability if workflows are maliciously altered or halted. The impact is particularly significant for organizations relying on FlyteAdmin for critical data processing pipelines, such as financial institutions, healthcare providers, and research organizations. However, since exploitation requires possession of valid tokens and the vulnerability does not allow token forgery or privilege escalation, the risk is somewhat mitigated by existing authentication controls. The lack of known exploits suggests limited active targeting, but the potential for session hijacking or token replay attacks remains a concern. The vulnerability does not affect users relying on FlyteAdmin as the OAuth2 Authorization Server, reducing the scope of impact for some deployments.
Mitigation Recommendations
1. Upgrade FlyteAdmin to a version beyond 1.1.30 that includes the official patch addressing token expiration enforcement. 2. Immediately rotate signing keys used for token validation to invalidate all existing tokens and force re-authentication. Continue key rotation until the patched version is deployed. 3. Restrict FlyteAdmin ingress URLs from exposure to the public internet by implementing network segmentation, firewall rules, or VPN access controls to limit access to trusted internal networks. 4. Monitor authentication logs for unusual token reuse or prolonged session activity beyond normal token lifetimes. 5. Review and tighten session management policies in the external identity provider to ensure tokens are revoked or invalidated promptly upon logout or expiration. 6. Educate users and administrators on the importance of logging out and not sharing tokens. 7. Implement additional multi-factor authentication (MFA) where possible to reduce risk from token compromise. 8. Conduct regular security assessments and penetration testing focused on session management and token handling within FlyteAdmin deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3722
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 2:50:11 AM
Last updated: 8/12/2025, 3:46:01 AM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.