Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v23w-pppm-jh66

Опубликовано: 17 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Silverstripe GraphQL has DDOS Vulnerability due to lack of protection against recursive queries

Impact

An attacker could use a recursive graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed graphql schemas.

If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this may further mitigate the risk.

The fix includes some new configuration options which you might want to tweak for your project, based on your own requirements. See the documentation in the references for details.

Patches

Patched in 3.8.2, 4.1.3, 4.2.5, 4.3.4, 5.0.3

References

Reported by

Jason Nguyen from phew (https://phew.co.nz/)

Пакеты

Наименование

silverstripe/graphql

composer
Затронутые версииВерсия исправления

>= 3.0.0, < 3.8.2

3.8.2

Наименование

silverstripe/graphql

composer
Затронутые версииВерсия исправления

>= 4.0.0, < 4.1.3

4.1.3

Наименование

silverstripe/graphql

composer
Затронутые версииВерсия исправления

>= 4.2.0, < 4.2.5

4.2.5

Наименование

silverstripe/graphql

composer
Затронутые версииВерсия исправления

>= 4.3.0, < 4.3.4

4.3.4

Наименование

silverstripe/graphql

composer
Затронутые версииВерсия исправления

>= 5.0.0, < 5.0.3

5.0.3

EPSS

Процентиль: 69%
0.00585
Низкий

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

silverstripe-graphql is a package which serves Silverstripe data in GraphQL representations. An attacker could use a recursive graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed graphql schemas. If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this may further mitigate the risk. This issue has been addressed in versions 3.8.2, 4.1.3, 4.2.5, 4.3.4, and 5.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 69%
0.00585
Низкий

7.5 High

CVSS3

Дефекты

CWE-400