CVE-2020-11037 – wagtail
Package
Manager: pip
Name: wagtail
Vulnerable Version: >=0 <2.7.3 || >=2.8rc1 <2.8.2 || =2.9rc1 || >=2.9rc1 <2.9
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N
EPSS: 0.00052 pctl0.16004
Details
Potential Observable Timing Discrepancy in Wagtail ### Impact A potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's "Privacy" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. (This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).) Privacy settings that restrict access to pages / documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability. ### Patches Patched versions have been released as Wagtail 2.7.3 (for the LTS 2.7 branch), Wagtail 2.8.2 and Wagtail 2.9. ### Workarounds Site owners who are unable to upgrade to the new versions can use [user- or group-based privacy restrictions](https://docs.wagtail.io/en/stable/advanced_topics/privacy.html) to restrict access to sensitive information; these are unaffected by this vulnerability.
Metadata
Created: 2020-05-07T18:04:53Z
Modified: 2024-11-19T19:19:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-jjjr-3jcw-f8v6/GHSA-jjjr-3jcw-f8v6.json
CWE IDs: ["CWE-208", "CWE-362"]
Alternative ID: GHSA-jjjr-3jcw-f8v6
Finding: F063
Auto approve: 1