CVE-2021-32770
Basic-auth app bundle credential exposure in gatsby-source-wordpress
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Gatsby is a framework for building websites. The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected. A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`. One may manually edit the app.js file post-build as a workaround.
Gatsby es un framework para la construcción de sitios web. El plugin gatsby-source-wordpress anterior a versiones 4.0.8 y 5.9.2 filtra variables de autenticación básica HTTP .htaccess en el paquete app.js durante el tiempo de construcción. Unos usuarios que no inicializan las credenciales de autenticación básica en el gatsby-config.js no están afectados. Ha sido introducido un parche en gatsby-source-wordpress@4.0.8 y gatsby-source-wordpress@5.9.2 que mitiga el problema al filtrar todas las variables especificadas en la sección "auth: { }". los usuarios que dependen de esta funcionalidad se les aconseja actualizar a la última versión de gatsby-source-wordpress, ejecutar "gatsby clean" seguido de "gatsby build". Se puede editar manualmente el archivo app.js después de la construcción como una solución
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-12 CVE Reserved
- 2021-07-15 CVE Published
- 2024-06-06 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-522: Insufficiently Protected Credentials
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gatsbyjs Search vendor "Gatsbyjs" | Gatsby-source-wordpress Search vendor "Gatsbyjs" for product "Gatsby-source-wordpress" | < 4.0.8 Search vendor "Gatsbyjs" for product "Gatsby-source-wordpress" and version " < 4.0.8" | node.js |
Affected
| ||||||
Gatsbyjs Search vendor "Gatsbyjs" | Gatsby-source-wordpress Search vendor "Gatsbyjs" for product "Gatsby-source-wordpress" | >= 5.0.0 < 5.9.2 Search vendor "Gatsbyjs" for product "Gatsby-source-wordpress" and version " >= 5.0.0 < 5.9.2" | node.js |
Affected
|