Security¶
Note
Please read the following note about some 3rd party vulnerabilities
OpenSSL
After conducting internal research, we can confirm that Dataiku DSS is not vulnerable to the two OpenSSL vulnerabilities reported in November 2022 (CVE-2022-3602 and CVE-2022-3786). These vulnerabilities only affect OpenSSL 3, which no Dataiku product ships with.
If you are using Dataiku Cloud Stacks or Dataiku Cloud, no operation is required.
Please however note that if you are using Dataiku Custom setup, depending on your operating system, an operating system update may be needed. Please refer to your OS provider’s instructions.
Text4Shell
After conducting internal research, we can confirm that Dataiku DSS is not vulnerable to the “Text4Shell” vulnerability (CVE-2022-42889). Dataiku DSS (nor its bundled Spark) do not use the specific vulnerable function StringSubstitutor/StringLookup.
No mitigation nor upgrade is required. Dataiku keeps closely monitoring the security situation and will take action if a potential exploitation path appears.
SpringShell
After conducting internal research, we can confirm that Dataiku DSS is not vulnerable to the “SpringShell” vulnerability (CVE-2022-22965).
Dataiku DSS does not use the specific vulnerable spring-webmvc “data binding” feature.
Dataiku DSS is not vulnerable either to the unrelated Spring Cloud Function vulnerability (CVE-2022-22963), nor to the medium-severity CVE-2022-22950.
No mitigation action nor upgrade is required. Dataiku keeps closely monitoring the security situation based on information provided by Spring and by JFrog, as it does for all of its third-party dependencies, and will take action if a vulnerability is exploitable.
Log4J
After conducting internal research, we can confirm that Dataiku DSS is not vulnerable to the family of vulnerabilities regarding Log4J:
“log4shell” vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
JMSAppender and JMSSink vulnerabilities (CVE-2021-4104, CVE-2021-44832,CVE-2022-23302)
JDBCAppender vulnerabilities (CVE-2022-23305)
SocketAppender vulnerability (CVE-2019-17571)
SMTPAppender vulnerability (CVE-2020-9488)
Chainsaw vulnerability (CVE-2022-23307)
Dataiku does not use any of the vulnerable features.
No mitigation action nor upgrade is required. Dataiku keeps closely monitoring the security situation on log4j, as it does for all of its third-party dependencies, and will take action if a vulnerability is exploitable.
Nginx LDAP reference
Dataiku DSS does not use the Nginx LDAP reference implementation and is not vulnerable to the Nginx LDAP reference implementation security vulnerabilities
- Project Access
- Main project permissions
- Connections security
- User profiles
- Shared objects
- Workspaces & dashboards authorizations
- User secrets
- Audit Trail
- Govern Security: Roles and Permissions
- Configuring LDAP authentication
- Single Sign-On
- Multi-Factor Authentication
- Passwords security
- Advanced security options