Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTI3Zzgtcjl2dy03NjV4

Private Field data leak

This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control.

This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information.

Impact

Under some circumstances, field values or field value meta data can be determined, despite the field or list having read access control configured. If you use private fields or lists, you may be impacted.

Patches

None, at this time

Workarounds

None, at this time

References

None

For more information

For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published.

If needed, you can email us at [email protected]

Permalink: https://github.com/advisories/GHSA-27g8-r9vw-765x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTI3Zzgtcjl2dy03NjV4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: over 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-27g8-r9vw-765x, CVE-2021-32624
References: Repository: https://github.com/keystonejs/keystone-5
Blast Radius: 18.7

Affected Packages

npm:@keystonejs/keystone
Dependent packages: 11
Dependent repositories: 313
Downloads: 4,602 last month
Affected Version Ranges: <= 19.3.2
No known fixed version
All affected versions: 5.0.0, 5.1.0, 5.1.1, 5.2.0, 5.2.1, 5.3.0, 5.4.0, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.5.0, 5.6.0, 6.0.0, 6.0.1, 6.0.2, 7.0.0, 7.1.0, 8.0.0, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 9.0.0, 9.0.1, 10.0.0, 10.1.0, 11.0.0, 11.1.0, 11.1.1, 11.1.2, 11.1.3, 11.2.0, 12.0.0, 13.0.0, 13.1.0, 13.1.1, 14.0.0, 14.0.1, 14.0.2, 15.0.0, 16.0.0, 17.0.0, 17.1.0, 17.1.1, 17.1.2, 18.0.0, 18.1.0, 19.0.0, 19.1.0, 19.2.0, 19.2.1, 19.3.0, 19.3.1, 19.3.2