Skip to content

Time-Based Information Disclosure Vulnerability in Flow

Moderate severity GitHub Reviewed Published May 17, 2024 to the GitHub Advisory Database • Updated May 17, 2024

Package

composer neos/flow (Composer)

Affected versions

>= 2.3.0, < 2.3.16
>= 3.0.0, < 3.0.10
>= 3.1.0, < 3.1.7
>= 3.2.0, < 3.2.7
>= 3.3.0, < 3.3.5

Patched versions

2.3.16
3.0.10
3.1.7
3.2.7
3.3.5

Description

The PersistedUsernamePasswordProvider was prone to a information disclosure of account existance based on timing attacks as the hashing of passwords was only done in case an account was found. We changed the core so that the provider always does a password comparison in case credentials were submitted at all.

References

Published to the GitHub Advisory Database May 17, 2024
Reviewed May 17, 2024
Last updated May 17, 2024

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-6pq8-67pw-j6hw

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.