Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mYzc1LTU4cjgtcm0zaM4AA2kA
Wagtail vulnerable to disclosure of user names via admin bulk action views
Impact
A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
Patches
Patched versions have been released as Wagtail 4.1.9 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release.
Workarounds
None.
Acknowledgements
Many thanks to @quyenheu for reporting this issue.
For more information
If you have any questions or comments about this advisory:
- Visit Wagtail's support channels
- Email us at [email protected] (view our security policy for more information).
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mYzc1LTU4cjgtcm0zaM4AA2kA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 2.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-fc75-58r8-rm3h, CVE-2023-45809
References:
- https://github.com/wagtail/wagtail/security/advisories/GHSA-fc75-58r8-rm3h
- https://github.com/wagtail/wagtail/commit/0bacd29473107d9d7f5b723a15a683449679756d
- https://github.com/wagtail/wagtail/commit/2231f462c75dfe84307fb40577e8c2109a23b27e
- https://github.com/wagtail/wagtail/commit/bc96aed6ac53f998b2f4c4bf97e2d4f5fe337e5b
- https://github.com/wagtail/wagtail/releases/tag/v4.1.9
- https://github.com/wagtail/wagtail/releases/tag/v5.0.5
- https://github.com/wagtail/wagtail/releases/tag/v5.1.3
- https://nvd.nist.gov/vuln/detail/CVE-2023-45809
- https://github.com/pypa/advisory-database/tree/main/vulns/wagtail/PYSEC-2023-219.yaml
- https://github.com/advisories/GHSA-fc75-58r8-rm3h
Blast Radius: 8.9
Affected Packages
pypi:wagtail
Dependent packages: 200Dependent repositories: 1,955
Downloads: 267,948 last month
Affected Version Ranges: >= 5.1.0, < 5.1.3, >= 4.2.0, < 5.0.5, < 4.1.9
Fixed in: 5.1.3, 5.0.5, 4.1.9
All affected versions: 0.3.1, 0.4.1, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 1.3.1, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.5.1, 1.5.2, 1.5.3, 1.6.1, 1.6.2, 1.6.3, 1.8.1, 1.8.2, 1.9.1, 1.10.1, 1.11.1, 1.12.1, 1.12.2, 1.12.3, 1.12.4, 1.12.5, 1.12.6, 1.13.1, 1.13.2, 1.13.3, 1.13.4, 2.0.1, 2.0.2, 2.1.1, 2.1.2, 2.1.3, 2.2.1, 2.2.2, 2.5.1, 2.5.2, 2.6.1, 2.6.2, 2.6.3, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.8.1, 2.8.2, 2.9.1, 2.9.2, 2.9.3, 2.10.1, 2.10.2, 2.11.1, 2.11.2, 2.11.3, 2.11.4, 2.11.5, 2.11.6, 2.11.7, 2.11.8, 2.11.9, 2.12.1, 2.12.2, 2.12.3, 2.12.4, 2.12.5, 2.12.6, 2.13.1, 2.13.2, 2.13.3, 2.13.4, 2.13.5, 2.14.1, 2.14.2, 2.15.1, 2.15.2, 2.15.3, 2.15.4, 2.15.5, 2.15.6, 2.16.1, 2.16.2, 2.16.3, 3.0.1, 3.0.2, 3.0.3, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.1.7, 4.1.8, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.1.1, 5.1.2
All unaffected versions: 4.1.9, 5.0.5, 5.1.3, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.1.1, 6.1.2, 6.1.3, 6.2.1, 6.2.2, 6.2.3, 6.3.1