Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.
Resolving versions: Ibexa DXP v1.0.13, v2.3.12
Remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.
This issue was reported to us by Philippe Tranca ("trancap") of the company Lexfo. We are very grateful for their research, and responsible disclosure to us of this critical vulnerability.
If you have any questions or comments about this advisory, please contact Support via your service portal.
{ "nvd_published_at": "2022-11-10T21:15:00Z", "github_reviewed_at": "2022-11-10T21:46:14Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-200", "CWE-922" ] }