Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. silverstripe/framework
  4. ›
  5. GHSA-8v6m-7f5v-hhx6

GHSA-8v6m-7f5v-hhx6: Silverstripe Brute force bypass on default admin

May 23, 2024

Default Administrator accounts were not subject to the same brute force protection afforded to other Member accounts. Failed login counts were not logged for default admins resulting in unlimited attempts on the default admin username and password.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/SS-2016-005-1.yaml
  • github.com/advisories/GHSA-8v6m-7f5v-hhx6
  • github.com/silverstripe/silverstripe-framework
  • github.com/silverstripe/silverstripe-framework/commit/f32c893546340c8c279fd1ab6d4269e9d6539bc2
  • www.silverstripe.org/download/security-releases/ss-2016-005

Code Behaviors & Features

Detect and mitigate GHSA-8v6m-7f5v-hhx6 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.1.18 before 3.1.19, all versions starting from 3.2.3 before 3.2.4, all versions starting from 3.3.1 before 3.3.2

Fixed versions

  • 3.1.19
  • 3.2.4
  • 3.3.2

Solution

Upgrade to versions 3.1.19, 3.2.4, 3.3.2 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-307: Improper Restriction of Excessive Authentication Attempts

Source file

packagist/silverstripe/framework/GHSA-8v6m-7f5v-hhx6.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:18 +0000.