CVE-2024-32969
Description
vantage6 is an open-source infrastructure for privacy preserving analysis. Collaboration administrators can add extra organizations to their collaboration that can extend their influence. For example, organizations that they include can then create new users for which they know the passwords, and use that to read task results of other collaborations that that organization is involved in. This is only relatively trusted users - with access to manage a collaboration - are able to do this, which reduces the impact. This vulnerability was patched in version 4.5.0rc3.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vantage6PyPI | < 4.5.0rc3 | 4.5.0rc3 |
Patches
127f4ee3fade5Merge pull request from GHSA-99r4-cjp4-3hmx
1 file changed · +11 −0
vantage6-server/vantage6/server/resource/collaboration.py+11 −0 modified@@ -543,6 +543,17 @@ def patch(self, id): }, HTTPStatus.BAD_REQUEST collaboration.name = name if "organization_ids" in data: + # Users with permission to edit a collaboration at collaboration scope are + # not allowed to change the organizations of the collaboration: that would + # be a permission escalation as doing so may allow them to also do other + # actions for newly added organizations. Therefore, only users with global + # permission can alter the organizations in a collaboration. + if not self.r.e_glo.can(): + return { + "msg": "You lack the permission to change the organizations of a " + "collaboration!" + }, HTTPStatus.UNAUTHORIZED + # set new organizations collaboration.organizations = [ db.Organization.get(org_id) for org_id in data["organization_ids"]
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.