GHSA-mg2g-8pwj-r2j2

Suggest an improvement
Source
https://github.com/advisories/GHSA-mg2g-8pwj-r2j2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-mg2g-8pwj-r2j2/GHSA-mg2g-8pwj-r2j2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mg2g-8pwj-r2j2
Aliases
Published
2021-06-10T17:21:33Z
Modified
2024-02-17T05:36:28.183403Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Authentication bypass in SilverStripe GraphQL
Details

The GraphQL module accepts basic-auth as an authentication method by default. This can be used to bypass MFA authentication if the silverstripe/mfa module is installed, which is now a commonly installed module. A users password is still required though.

Basic-auth has been removed as a default authentication method. If desired, it can be re-enabled by adding it to the authenticators key of a schema, or on SilverStripe\Graphql\Auth\Handler

Database specific
{
    "nvd_published_at": "2021-06-08T20:15:00Z",
    "cwe_ids": [
        "CWE-287",
        "CWE-288"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-06-10T14:41:10Z"
}
References

Affected packages

Packagist / silverstripe/graphql

Package

Name
silverstripe/graphql
Purl
pkg:composer/silverstripe/graphql

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0.0
Fixed
3.5.0

Affected versions

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.1.0-rc1
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.2.0-alpha1
3.2.0-rc1
3.2.0-rc2
3.2.0
3.2.1
3.2.2
3.2.3
3.2.4
3.3.0-beta1
3.3.0-rc1
3.3.0
3.4.0-beta1
3.4.0-rc1
3.4.0
3.4.1
3.5.0-beta1
3.5.0-rc1

Packagist / silverstripe/graphql

Package

Name
silverstripe/graphql
Purl
pkg:composer/silverstripe/graphql

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0-alpha1
Fixed
4.0.0-alpha2

Affected versions

4.*

4.0.0-alpha1