Skip to main content

CVE-2022-31145: CWE-613: Insufficient Session Expiration in flyteorg flyteadmin

Medium
Published: Wed Jul 13 2022 (07/13/2022, 20:30:12 UTC)
Source: CVE
Vendor/Project: flyteorg
Product: flyteadmin

Description

FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.

AI-Powered Analysis

AILast updated: 06/23/2025, 02:50:11 UTC

Technical Analysis

CVE-2022-31145 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting flyteorg's FlyteAdmin control plane, specifically versions 1.1.30 and earlier. FlyteAdmin is responsible for managing entities and administering workflow executions within the Flyte platform. The vulnerability arises when FlyteAdmin is configured to use an external identity provider for authentication. In this scenario, authenticated users can continue to use Access Tokens and ID Tokens even after their expiration time has passed. This means that session tokens remain valid beyond their intended lifespan, potentially allowing unauthorized continued access if tokens are compromised or if users do not log out properly. Notably, this issue does not affect users who use FlyteAdmin as the OAuth2 Authorization Server itself, as token expiration is properly enforced in that configuration. The root cause is insufficient session expiration enforcement, which violates best practices for session management and token lifecycle. A patch addressing this issue is available on the master branch of the FlyteAdmin repository. As an interim mitigation, rotating signing keys immediately invalidates all existing tokens, forcing users to obtain new tokens and effectively terminating lingering sessions. It is recommended to continue rotating keys until the patched FlyteAdmin version is deployed. Additionally, restricting FlyteAdmin ingress URLs from exposure to the internet reduces the attack surface. There are no known exploits in the wild reported for this vulnerability as of the publication date (July 13, 2022).

Potential Impact

For European organizations using FlyteAdmin versions 1.1.30 or earlier with external identity providers, this vulnerability can lead to prolonged unauthorized access if tokens are compromised or sessions are not properly terminated. Attackers or malicious insiders could exploit expired tokens to maintain access to workflow management and execution controls, potentially leading to unauthorized data access, manipulation of workflows, or disruption of automated processes. This undermines confidentiality and integrity of sensitive operational data and may impact availability if workflows are maliciously altered or halted. The impact is particularly significant for organizations relying on FlyteAdmin for critical data processing pipelines, such as financial institutions, healthcare providers, and research organizations. However, since exploitation requires possession of valid tokens and the vulnerability does not allow token forgery or privilege escalation, the risk is somewhat mitigated by existing authentication controls. The lack of known exploits suggests limited active targeting, but the potential for session hijacking or token replay attacks remains a concern. The vulnerability does not affect users relying on FlyteAdmin as the OAuth2 Authorization Server, reducing the scope of impact for some deployments.

Mitigation Recommendations

1. Upgrade FlyteAdmin to a version beyond 1.1.30 that includes the official patch addressing token expiration enforcement. 2. Immediately rotate signing keys used for token validation to invalidate all existing tokens and force re-authentication. Continue key rotation until the patched version is deployed. 3. Restrict FlyteAdmin ingress URLs from exposure to the public internet by implementing network segmentation, firewall rules, or VPN access controls to limit access to trusted internal networks. 4. Monitor authentication logs for unusual token reuse or prolonged session activity beyond normal token lifetimes. 5. Review and tighten session management policies in the external identity provider to ensure tokens are revoked or invalidated promptly upon logout or expiration. 6. Educate users and administrators on the importance of logging out and not sharing tokens. 7. Implement additional multi-factor authentication (MFA) where possible to reduce risk from token compromise. 8. Conduct regular security assessments and penetration testing focused on session management and token handling within FlyteAdmin deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3722

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 2:50:11 AM

Last updated: 8/12/2025, 3:46:01 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats