Skip to content

Silverstripe has Incorrect Default Permissions

Moderate severity GitHub Reviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Feb 7, 2024

Package

composer silverstripe/graphql (Composer)

Affected versions

>= 3.2.0, < 3.2.4

Patched versions

3.2.4
composer silverstripe/recipe-cms (Composer)
>= 4.5.0, < 4.5.3
4.5.3

Description

SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.

References

Published by the National Vulnerability Database Jul 15, 2020
Published to the GitHub Advisory Database May 24, 2022
Reviewed Jul 20, 2023
Last updated Feb 7, 2024

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2020-6165

GHSA ID

GHSA-589q-75r3-mfq4

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.