Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. silverstripe/framework
  4. ›
  5. GHSA-crr3-h4m8-7f56

GHSA-crr3-h4m8-7f56: silverstripe/framework vulnerable to member disclosure in login form

May 27, 2024

There is a user ID enumeration vulnerability in our brute force error messages.

  • Users that don’t exist in will never get a locked out message
  • Users that do exist, will get a locked out message

This means an attacker can infer or confirm user details that exist in the member table.

This issue has been resolved by ensuring that login attempt logging and lockout process works equivalently for non-existent users as it does for existant users.

This is a regression of SS-2017-002.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/SS-2018-010-1.yaml
  • github.com/advisories/GHSA-crr3-h4m8-7f56
  • github.com/silverstripe/silverstripe-framework
  • github.com/silverstripe/silverstripe-framework/commit/5887201dd578a5b9779c33a182153d2ce973ab41
  • www.silverstripe.org/download/security-releases/ss-2018-010

Code Behaviors & Features

Detect and mitigate GHSA-crr3-h4m8-7f56 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.0.0-rc1 before 4.0.4, all versions starting from 4.1.0-rc1 before 4.1.1

Fixed versions

  • 4.0.4
  • 4.1.1

Solution

Upgrade to versions 4.0.4, 4.1.1 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

packagist/silverstripe/framework/GHSA-crr3-h4m8-7f56.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 00:14:58 +0000.