Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3p7g-wrgg-wq45

Опубликовано: 10 нояб. 2022
Источник: github
Github: Прошло ревью

Описание

GraphQL queries can expose password hashes

Impact

Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.

Patches

Affected versions: Ibexa DXP v3.3.*, v4.2.*, eZ Platform v2.5.* Resolving versions: Ibexa DXP v3.3.28, v4.2.3, eZ Platform v2.5.31

Workarounds

Remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.

References

This issue was reported to us by Philippe Tranca ("trancap") of the company Lexfo. We are very grateful for their research, and responsible disclosure to us of this critical vulnerability.

For more information

If you have any questions or comments about this advisory, please contact Support via your service portal.

Пакеты

Наименование

ibexa/graphql

composer
Затронутые версииВерсия исправления

>= 2.5.0, < 2.5.31

2.5.31

Наименование

ibexa/graphql

composer
Затронутые версииВерсия исправления

>= 4.2.0, < 4.2.3

4.2.3

Наименование

ibexa/graphql

composer
Затронутые версииВерсия исправления

>= 3.3.0, < 3.3.28

3.3.28

Дефекты

CWE-916

Дефекты

CWE-916