// For flags

CVE-2023-49783

No permission checks for editing/deleting records with CSV import form

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Silverstripe Admin provides a basic management interface for the Silverstripe Framework. In versions on the 1.x branch prior to 1.13.19 and on the 2.x branch prior to 2.1.8, users who don't have edit or delete permissions for records exposed in a `ModelAdmin` can still edit or delete records using the CSV import form, provided they have create permissions. The likelihood of a user having create permissions but not having edit or delete permissions is low, but it is possible. Note that this doesn't affect any `ModelAdmin` which has had the import form disabled via the `showImportForm` public property. Versions 1.13.19 and 2.1.8 contain a patch for the issue. Those who have a custom implementation of `BulkLoader` should update their implementations to respect permissions when the return value of `getCheckPermissions()` is true. Those who use any `BulkLoader` in their own project logic, or maintain a module which uses it, should consider passing `true` to `setCheckPermissions()` if the data is provided by users.

Silverstripe Admin proporciona una interfaz de administración básica para Silverstripe Framework. En las versiones de la rama 1.x anteriores a la 1.13.19 y de la rama 2.x anteriores a la 2.1.8, los usuarios que no tienen permisos de edición o eliminación de registros expuestos en un `ModelAdmin` aún pueden editar o eliminar registros, utilizando el formulario de importación CSV, siempre que tengan permisos de creación. La probabilidad de que un usuario tenga permisos de creación pero no de edición o eliminación es baja, pero es posible. Tenga en cuenta que esto no afecta a ningún `ModelAdmin` que tenga el formulario de importación deshabilitado a través de la propiedad pública `showImportForm`. Las versiones 1.13.19 y 2.1.8 contienen un parche para el problema. Aquellos que tienen una implementación personalizada de `BulkLoader` deben actualizar sus implementaciones para respetar los permisos cuando el valor de retorno de `getCheckPermissions()` sea verdadero. Aquellos que usan cualquier `BulkLoader` en su propia lógica de proyecto, o mantienen un módulo que lo usa, deberían considerar pasar `true` a `setCheckPermissions()` si los datos los proporcionan los usuarios.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-11-30 CVE Reserved
  • 2024-01-23 CVE Published
  • 2024-02-02 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Silverstripe
Search vendor "Silverstripe"
Admin
Search vendor "Silverstripe" for product "Admin"
>= 1.0.0 < 1.13.19
Search vendor "Silverstripe" for product "Admin" and version " >= 1.0.0 < 1.13.19"
silverstripe
Affected
Silverstripe
Search vendor "Silverstripe"
Admin
Search vendor "Silverstripe" for product "Admin"
>= 2.0.0 < 2.1.8
Search vendor "Silverstripe" for product "Admin" and version " >= 2.0.0 < 2.1.8"
silverstripe
Affected