CVE-2021-32691 – @apollosproject/data-connector-rock
Package
Manager: npm
Name: @apollosproject/data-connector-rock
Vulnerable Version: >=0 <2.20.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00476 pctl0.63969
Details
Auto-merging Person Records Compromised ### Impact New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). ### Patches We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details. ### Workarounds If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class. ```js create = async (profile) => { const rockUpdateFields = this.mapApollosFieldsToRock(profile); // auto-merge functionality is compromised // we are creating a new user and patching them with profile details const id = await this.post('/People', { Gender: 0, // required by Rock. Listed first so it can be overridden. IsSystem: false, // required by rock }); await this.patch(`/People/${id}`, { ...rockUpdateFields, }); return id; }; ``` ### For more information If you have any questions or comments about this advisory: * Email us at [support@apollos.app](mailto:support@apollos.app)
Metadata
Created: 2021-06-21T17:07:47Z
Modified: 2021-06-16T21:25:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-r578-pj6f-r4ff/GHSA-r578-pj6f-r4ff.json
CWE IDs: ["CWE-287", "CWE-303"]
Alternative ID: GHSA-r578-pj6f-r4ff
Finding: F039
Auto approve: 1