CVE-2022-39366: CWE-303: Incorrect Implementation of Authentication Algorithm in datahub-project datahub
DataHub is an open-source metadata platform. Prior to version 0.8.45, the `StatelessTokenService` of the DataHub metadata service (GMS) does not verify the signature of JWT tokens. This allows an attacker to connect to DataHub instances as any user if Metadata Service authentication is enabled. This vulnerability occurs because the `StatelessTokenService` of the Metadata service uses the `parse` method of `io.jsonwebtoken.JwtParser`, which does not perform a verification of the cryptographic token signature. This means that JWTs are accepted regardless of the used algorithm. This issue may lead to an authentication bypass. Version 0.8.45 contains a patch for the issue. There are no known workarounds.
AI Analysis
Technical Summary
CVE-2022-39366 is a vulnerability affecting DataHub, an open-source metadata platform widely used for managing and querying metadata across data ecosystems. The issue resides in the StatelessTokenService component of the DataHub metadata service (GMS) in versions prior to 0.8.45. Specifically, the vulnerability stems from an incorrect implementation of JWT (JSON Web Token) authentication. The service uses the `parse` method from the `io.jsonwebtoken.JwtParser` library, which does not verify the cryptographic signature of JWT tokens. As a result, the system accepts JWTs regardless of the signing algorithm or signature validity, effectively bypassing authentication controls. This flaw allows an attacker to impersonate any user by crafting arbitrary JWT tokens without possessing valid cryptographic keys. Consequently, an attacker can gain unauthorized access to DataHub instances where Metadata Service authentication is enabled, potentially accessing sensitive metadata and performing actions with the privileges of the impersonated user. The vulnerability is classified under CWE-303 (Incorrect Implementation of Authentication Algorithm) and CWE-287 (Improper Authentication). The issue was addressed in DataHub version 0.8.45 by introducing proper signature verification. No known workarounds exist, and no public exploits have been reported to date. The vulnerability does not require user interaction but does require the attacker to connect to the DataHub service endpoint, which is typically exposed within enterprise environments or cloud deployments. Given the nature of the flaw, it compromises the integrity and confidentiality of the system by allowing unauthorized access, but it does not directly affect availability.
Potential Impact
For European organizations using affected versions of DataHub, this vulnerability poses a significant risk to the confidentiality and integrity of their metadata repositories. Metadata often contains critical information about data assets, lineage, and governance, which if compromised, can lead to unauthorized data access, data leakage, and manipulation of metadata that could undermine data trustworthiness. Attackers exploiting this flaw could impersonate privileged users, potentially escalating their access within the data ecosystem or exfiltrating sensitive organizational information. This risk is particularly acute for organizations in regulated sectors such as finance, healthcare, and government, where metadata integrity is essential for compliance and auditability. Additionally, since DataHub is often integrated with other data platforms, a compromise here could serve as a pivot point for broader attacks within an enterprise’s data infrastructure. The lack of authentication verification also undermines trust in the platform’s security model, potentially impacting operational continuity and data governance efforts.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade all DataHub instances to version 0.8.45 or later, where the signature verification issue has been fixed. Organizations should prioritize this patch deployment, especially in production environments. In parallel, organizations should audit their DataHub deployments to identify any instances running vulnerable versions. Network-level controls should be implemented to restrict access to the Metadata Service endpoints to trusted internal networks or VPNs, reducing exposure to external attackers. Monitoring and logging of authentication attempts and token usage should be enhanced to detect anomalous access patterns indicative of token forgery or misuse. Where possible, implement additional layers of authentication such as mutual TLS or IP whitelisting to limit unauthorized connections. Conduct a thorough review of user privileges within DataHub to minimize the impact of potential impersonation. Finally, organizations should consider integrating DataHub authentication with centralized identity providers that enforce multi-factor authentication and robust token validation, adding defense in depth beyond the platform’s native controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Belgium
CVE-2022-39366: CWE-303: Incorrect Implementation of Authentication Algorithm in datahub-project datahub
Description
DataHub is an open-source metadata platform. Prior to version 0.8.45, the `StatelessTokenService` of the DataHub metadata service (GMS) does not verify the signature of JWT tokens. This allows an attacker to connect to DataHub instances as any user if Metadata Service authentication is enabled. This vulnerability occurs because the `StatelessTokenService` of the Metadata service uses the `parse` method of `io.jsonwebtoken.JwtParser`, which does not perform a verification of the cryptographic token signature. This means that JWTs are accepted regardless of the used algorithm. This issue may lead to an authentication bypass. Version 0.8.45 contains a patch for the issue. There are no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-39366 is a vulnerability affecting DataHub, an open-source metadata platform widely used for managing and querying metadata across data ecosystems. The issue resides in the StatelessTokenService component of the DataHub metadata service (GMS) in versions prior to 0.8.45. Specifically, the vulnerability stems from an incorrect implementation of JWT (JSON Web Token) authentication. The service uses the `parse` method from the `io.jsonwebtoken.JwtParser` library, which does not verify the cryptographic signature of JWT tokens. As a result, the system accepts JWTs regardless of the signing algorithm or signature validity, effectively bypassing authentication controls. This flaw allows an attacker to impersonate any user by crafting arbitrary JWT tokens without possessing valid cryptographic keys. Consequently, an attacker can gain unauthorized access to DataHub instances where Metadata Service authentication is enabled, potentially accessing sensitive metadata and performing actions with the privileges of the impersonated user. The vulnerability is classified under CWE-303 (Incorrect Implementation of Authentication Algorithm) and CWE-287 (Improper Authentication). The issue was addressed in DataHub version 0.8.45 by introducing proper signature verification. No known workarounds exist, and no public exploits have been reported to date. The vulnerability does not require user interaction but does require the attacker to connect to the DataHub service endpoint, which is typically exposed within enterprise environments or cloud deployments. Given the nature of the flaw, it compromises the integrity and confidentiality of the system by allowing unauthorized access, but it does not directly affect availability.
Potential Impact
For European organizations using affected versions of DataHub, this vulnerability poses a significant risk to the confidentiality and integrity of their metadata repositories. Metadata often contains critical information about data assets, lineage, and governance, which if compromised, can lead to unauthorized data access, data leakage, and manipulation of metadata that could undermine data trustworthiness. Attackers exploiting this flaw could impersonate privileged users, potentially escalating their access within the data ecosystem or exfiltrating sensitive organizational information. This risk is particularly acute for organizations in regulated sectors such as finance, healthcare, and government, where metadata integrity is essential for compliance and auditability. Additionally, since DataHub is often integrated with other data platforms, a compromise here could serve as a pivot point for broader attacks within an enterprise’s data infrastructure. The lack of authentication verification also undermines trust in the platform’s security model, potentially impacting operational continuity and data governance efforts.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade all DataHub instances to version 0.8.45 or later, where the signature verification issue has been fixed. Organizations should prioritize this patch deployment, especially in production environments. In parallel, organizations should audit their DataHub deployments to identify any instances running vulnerable versions. Network-level controls should be implemented to restrict access to the Metadata Service endpoints to trusted internal networks or VPNs, reducing exposure to external attackers. Monitoring and logging of authentication attempts and token usage should be enhanced to detect anomalous access patterns indicative of token forgery or misuse. Where possible, implement additional layers of authentication such as mutual TLS or IP whitelisting to limit unauthorized connections. Conduct a thorough review of user privileges within DataHub to minimize the impact of potential impersonation. Finally, organizations should consider integrating DataHub authentication with centralized identity providers that enforce multi-factor authentication and robust token validation, adding defense in depth beyond the platform’s native controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6a83
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:00:04 PM
Last updated: 7/28/2025, 10:03:34 AM
Views: 13
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.