Lucene search

K
githubGitHub Advisory DatabaseGHSA-5PV8-PPVJ-4H68
HistoryMay 13, 2021 - 8:23 p.m.

Prevent user enumeration using Guard or the new Authenticator-based Security

2021-05-1320:23:02
CWE-200
CWE-203
GitHub Advisory Database
github.com
38

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

47.9%

Description

The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user.

Resolution

We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist.

The patch for this issue is available here for branch 3.4.

Credits

I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.

Affected configurations

Vulners
Node
symfonytwigRange<5.2.9
OR
symfonytwigRange<4.4.24
OR
symfonytwigRange<3.4.49
OR
symfonytwigRange<4.4.24
OR
symfonytwigRange<3.4.49
OR
symfonytwigRange<5.2.8
OR
symfonytwigRange<1.31.1
OR
symfonytwigRange<1.29.2
OR
lexikjwt-authentication-bundleRange<2.11.3
OR
lexikjwt-authentication-bundleRange<2.10.7
OR
symfonytwigRange<5.2.8
OR
symfonytwigRange<4.4.23
OR
symfonytwigRange<3.4.48
OR
symfonytwigRange<5.2.8
OR
symfonytwigRange<4.4.23
OR
symfonytwigRange<3.4.48
OR
symfonytwigRange<5.2.8

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

47.9%