Lucene search

K
githubGitHub Advisory DatabaseGHSA-C7PC-PGF6-MFH5
HistoryNov 10, 2022 - 9:46 p.m.

ezplatform-graphql GraphQL queries can expose password hashes

2022-11-1021:46:14
CWE-200
CWE-922
GitHub Advisory Database
github.com
17
impacted users
password hashes
graphql queries
ibexa dxp
vulnerable
user types
critical vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

23.3%

Impact

Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.

Patches

Resolving versions: Ibexa DXP v1.0.13, v2.3.12

Workarounds

Remove the “passwordHash” entry from “src/bundle/Resources/config/graphql/User.types.yaml” in the GraphQL package, and other properties like hash type, email, login if you prefer.

References

This issue was reported to us by Philippe Tranca (“trancap”) of the company Lexfo. We are very grateful for their research, and responsible disclosure to us of this critical vulnerability.

For more information

If you have any questions or comments about this advisory, please contact Support via your service portal.

Affected configurations

Vulners
Node
ezsystemsezplatform-graphqlRange2.0.0-beta12.3.12
OR
ezsystemsezplatform-graphqlRange1.0.0-rc11.0.13
VendorProductVersionCPE
ezsystemsezplatform-graphql*cpe:2.3:a:ezsystems:ezplatform-graphql:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

23.3%

Related for GHSA-C7PC-PGF6-MFH5