ezplatform-graphql GraphQL queries can expose password hashes
High severity
GitHub Reviewed
Published
Nov 10, 2022
in
ezsystems/ezplatform-graphql
•
Updated Jan 31, 2023
Package
Affected versions
>= 1.0.0-rc1, < 1.0.13
>= 2.0.0-beta1, < 2.3.12
Patched versions
1.0.13
2.3.12
Description
Published by the National Vulnerability Database
Nov 10, 2022
Published to the GitHub Advisory Database
Nov 10, 2022
Reviewed
Nov 10, 2022
Last updated
Jan 31, 2023
Impact
Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.
Patches
Resolving versions: Ibexa DXP v1.0.13, v2.3.12
Workarounds
Remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.
References
This issue was reported to us by Philippe Tranca ("trancap") of the company Lexfo. We are very grateful for their research, and responsible disclosure to us of this critical vulnerability.
For more information
If you have any questions or comments about this advisory, please contact Support via your service portal.
References