Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-41248

Опубликовано: 04 нояб. 2021
Источник: nvd
CVSS3: 7.1
CVSS3: 4.7
CVSS2: 2.6
EPSS Низкий

Описание

GraphiQL is the reference implementation of this monorepo, GraphQL IDE, an official project under the GraphQL Foundation. All versions of graphiql older than graphiql@1.4.7 are vulnerable to compromised HTTP schema introspection responses or schema prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete. In order for the attack to take place, the user must load a vulnerable schema in graphiql. There are a number of ways that can occur. By default, the schema URL is not attacker-controllable in graphiql or in its suggested implementations or examples, leaving only very complex attack vectors. If a custom implementation of graphiql's fetcher allows the schema URL to be set dynamically, such as a URL query parameter like ?endpoint= in graphql-playground, or a database provided value, then this custom graphiql implementation is vulnerable to phishing attacks, and thus much more readily available, low or no

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:graphql:graphiql:*:*:*:*:*:node.js:*:*
Версия от 0.5.0 (включая) до 1.4.7 (исключая)

EPSS

Процентиль: 60%
0.00398
Низкий

7.1 High

CVSS3

4.7 Medium

CVSS3

2.6 Low

CVSS2

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 7.1
github
около 4 лет назад

GraphiQL introspection schema template injection attack

EPSS

Процентиль: 60%
0.00398
Низкий

7.1 High

CVSS3

4.7 Medium

CVSS3

2.6 Low

CVSS2

Дефекты

CWE-79