CVE-2020-6165

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-6165
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6165.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-6165
Aliases
Published
2020-07-15T21:15:13Z
Modified
2024-09-03T03:32:32.447956Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.

References

Affected packages

Git / github.com/silverstripe/silverstripe-cms

Affected ranges

Type
GIT
Repo
https://github.com/silverstripe/silverstripe-cms
Events
Type
GIT
Repo
https://github.com/silverstripe/silverstripe-framework
Events

Affected versions

3.*

3.1.15
3.1.16
3.1.16-rc1
3.1.17
3.1.17-rc1
3.1.17-rc2
3.1.18
3.1.18-rc1
3.1.18-rc2
3.1.19-rc1
3.2.0
3.2.0-rc2
3.2.1
3.2.1-rc1
3.2.1-rc2
3.2.2
3.2.2-rc1
3.2.2-rc2
3.2.3
3.2.3-rc1
3.2.3-rc2
3.2.4-rc1