Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-589q-75r3-mfq4

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Silverstripe has Incorrect Default Permissions

SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.

Пакеты

Наименование

silverstripe/recipe-cms

composer
Затронутые версииВерсия исправления

>= 4.5.0, < 4.5.3

4.5.3

Наименование

silverstripe/graphql

composer
Затронутые версииВерсия исправления

>= 3.2.0, < 3.2.4

3.2.4

EPSS

Процентиль: 37%
0.00159
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 5.3
nvd
больше 5 лет назад

SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does n

EPSS

Процентиль: 37%
0.00159
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-276