logo

CVE-2022-24784 statamic/cms

Package

Manager: composer
Name: statamic/cms
Vulnerable Version: >=0 <3.2.39 || >=3.3.0 <3.3.2

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00254 pctl0.48521

Details

Discoverability of user password hash in Statamic CMS ## Description It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash. The hash would not be in the response, however the presence or absence of a result would confirm if the character was in the right position. It would take a long time since the API has throttling enabled by default. Additionally, the REST API would need to be enabled, as well as the users endpoint. Both of which are disabled by default. ## Resolution Filtering by password or password hash has been disabled. ## Credits We would like to thank Thibaud Kehler for reporting the issue.

Metadata

Created: 2022-03-29T22:11:45Z
Modified: 2022-03-29T22:11:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-qcgx-7p5f-hxvr/GHSA-qcgx-7p5f-hxvr.json
CWE IDs: ["CWE-200", "CWE-203", "CWE-326"]
Alternative ID: GHSA-qcgx-7p5f-hxvr
Finding: F026
Auto approve: 1