logo

CVE-2021-32624 @keystonejs/keystone

Package

Manager: npm
Name: @keystonejs/keystone
Vulnerable Version: >=0 <=19.3.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00314 pctl0.53929

Details

Private Field data leak This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information. ### Impact Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted. ### Patches None, at this time ### Workarounds None, at this time ### References None ### For more information For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published. If needed, you can email us at keystone@thinkmill.com.au

Metadata

Created: 2021-05-27T18:39:03Z
Modified: 2021-05-25T20:20:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-27g8-r9vw-765x/GHSA-27g8-r9vw-765x.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-27g8-r9vw-765x
Finding: F038
Auto approve: 1