Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-27g8-r9vw-765x

Опубликовано: 27 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Private Field data leak

This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control.

This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information.

Impact

Under some circumstances, field values or field value meta data can be determined, despite the field or list having read access control configured. If you use private fields or lists, you may be impacted.

Patches

None, at this time

Workarounds

None, at this time

References

None

For more information

For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published.

If needed, you can email us at keystone@thinkmill.com.au

Пакеты

Наименование

@keystonejs/keystone

npm
Затронутые версииВерсия исправления

<= 19.3.2

Отсутствует

EPSS

Процентиль: 54%
0.00314
Низкий

7.5 High

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

Keystone 5 is an open source CMS platform to build Node.js applications. This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information. Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted. No patches exist at this time. There are no workarounds at this time

EPSS

Процентиль: 54%
0.00314
Низкий

7.5 High

CVSS3

Дефекты

CWE-200