CVE-2021-4119 – ssddanbrown/bookstack
Package
Manager: composer
Name: ssddanbrown/bookstack
Vulnerable Version: >=0 <21.11.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01494 pctl0.80362
Details
BookStack is vulnerable to Improper Access Control. BookStack prior to version 21.11.3 is vulnerable to Improper Access Control. A logged-in user with no privileges OR guest user (if public access enabled) can access the /search/users/select AJAX endpoint meant for admins to manage audit logs, to dump all usernames existing in the Bookstack database. This can also be used to harvest email belonging to a user because BookStack also uses the code where(`email`, `like`, `%` . $search . `%`) to search for users based on email.
Metadata
Created: 2021-12-16T19:40:26Z
Modified: 2022-08-11T18:45:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-9c5c-5j4h-8q2c/GHSA-9c5c-5j4h-8q2c.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-9c5c-5j4h-8q2c
Finding: F039
Auto approve: 1