Lucene search

K
githubGitHub Advisory DatabaseGHSA-FC75-58R8-RM3H
HistoryOct 19, 2023 - 3:50 p.m.

Wagtail vulnerable to disclosure of user names via admin bulk action views

2023-10-1915:50:58
CWE-200
CWE-425
CWE-532
GitHub Advisory Database
github.com
16
wagtail
admin view
user names disclosure
bulk action
vulnerability
patches
url request
authentication rules

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

0.0004 Low

EPSS

Percentile

14.1%

Impact

A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.

Patches

Patched versions have been released as Wagtail 4.1.9 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release.

Workarounds

None.

Acknowledgements

Many thanks to @quyenheu for reporting this issue.

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
wagtailwagtailRange<5.1.3
OR
wagtailwagtailRange<5.0.5
OR
wagtailwagtailRange<4.1.9
CPENameOperatorVersion
wagtaillt5.1.3
wagtaillt5.0.5
wagtaillt4.1.9

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

0.0004 Low

EPSS

Percentile

14.1%

Related for GHSA-FC75-58R8-RM3H