GHSA-crr3-h4m8-7f56

Suggest an improvement
Source
https://github.com/advisories/GHSA-crr3-h4m8-7f56
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-crr3-h4m8-7f56/GHSA-crr3-h4m8-7f56.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-crr3-h4m8-7f56
Published
2024-05-27T23:23:51Z
Modified
2024-12-02T05:41:45.578550Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
silverstripe/framework vulnerable to member disclosure in login form
Details

There is a user ID enumeration vulnerability in our brute force error messages.

  • Users that don't exist in will never get a locked out message
  • Users that do exist, will get a locked out message

This means an attacker can infer or confirm user details that exist in the member table.

This issue has been resolved by ensuring that login attempt logging and lockout process works equivalently for non-existent users as it does for existant users.

This is a regression of SS-2017-002.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-27T23:23:51Z"
}
References

Affected packages

Packagist / silverstripe/framework

Package

Name
silverstripe/framework
Purl
pkg:composer/silverstripe/framework

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0-rc1
Fixed
4.0.4

Affected versions

4.*

4.0.0-rc1
4.0.0-rc2
4.0.0-rc3
4.0.0
4.0.1-rc1
4.0.1
4.0.2
4.0.3

Packagist / silverstripe/framework

Package

Name
silverstripe/framework
Purl
pkg:composer/silverstripe/framework

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.0-rc1
Fixed
4.1.1

Affected versions

4.*

4.1.0-rc1
4.1.0-rc2
4.1.0