// For flags

CVE-2020-6165

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.

SilverStripe versión 4.5.0, permite a atacantes leer determinados registros que no deberían haberse colocado en un conjunto de resultados. Esto afecta a silverstripe/recipe-cms. El mecanismo automático de comprobación de permisos en el módulo silverstripe/graphql no proporciona protección completa contra listas limitadas (por ejemplo, por medio de la paginación), lo que resulta en registros que deberían haber fallado en una comprobación de permisos que se agrega al conjunto de resultados final. Los endpoints de GraphQL están configurados por defecto (por ejemplo, para activos), pero el endpoint admin/graphql está protegido de acceso por defecto. Esto limita la vulnerabilidad a todos los usuarios autenticados, incluidos aquellos con permisos limitados (por ejemplo, cuando se visualiza registros expuestos por medio de admin/graphql requiere permisos de administrador). Sin embargo, si los endpoints personalizados de GraphQL han sido configurados para una implementación específica (generalmente bajo /graphql), esta vulnerabilidad también podría ser explotada por medio de peticiones no autenticadas. Esta vulnerabilidad solo se aplica a la lectura de registros; No permite el cambio no autorizado de registros

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-08 CVE Reserved
  • 2020-07-15 CVE Published
  • 2023-03-31 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-276: Incorrect Default Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Silverstripe
Search vendor "Silverstripe"
Silverstripe
Search vendor "Silverstripe" for product "Silverstripe"
>= 3.2.0 < 3.2.4
Search vendor "Silverstripe" for product "Silverstripe" and version " >= 3.2.0 < 3.2.4"
-
Affected
Silverstripe
Search vendor "Silverstripe"
Silverstripe
Search vendor "Silverstripe" for product "Silverstripe"
>= 3.2.5 < 3.3.0
Search vendor "Silverstripe" for product "Silverstripe" and version " >= 3.2.5 < 3.3.0"
-
Affected
Silverstripe
Search vendor "Silverstripe"
Silverstripe
Search vendor "Silverstripe" for product "Silverstripe"
>= 4.5.0 < 4.5.3
Search vendor "Silverstripe" for product "Silverstripe" and version " >= 4.5.0 < 4.5.3"
-
Affected