Skip to content

Craft CMS discloses password hashes

High severity GitHub Reviewed Published Dec 5, 2022 to the GitHub Advisory Database • Updated Jun 10, 2024

Package

composer craftcms/cms (Composer)

Affected versions

>= 3.0.0, <= 3.7.32

Patched versions

3.7.33

Description

All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework.

References

Published by the National Vulnerability Database Dec 5, 2022
Published to the GitHub Advisory Database Dec 5, 2022
Reviewed Dec 7, 2022
Last updated Jun 10, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2022-37783

GHSA ID

GHSA-h972-v458-m892

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.