CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
43.6%
It allows over the Admin Login form to detect which user (username, email) exists and which one do not exist.
Impacted by this issue are Sulu installation >= 2.5.0 and <2.5.10 using the newer Symfony Security System which is default since Symfony 6.0 but can be enabled in Symfony 5.4. Sulu Installation not using the old Symfony 5.4 security System and previous version are not impacted by this Security issue.
The problem has been patched in version 2.5.10.
Create a custom AuthenticationFailureHandler which does not return the $exception->getMessage();
instead the $exception->getMessageKey();
Currently no references.
github.com/advisories/GHSA-wmwf-49vv-p3mr
github.com/FriendsOfPHP/security-advisories/blob/master/sulu/sulu/CVE-2023-39343.yaml
github.com/sulu/sulu/commit/5f6c98ba030b2005793e2dc647cc938937ea889b
github.com/sulu/sulu/releases/tag/2.5.10
github.com/sulu/sulu/security/advisories/GHSA-wmwf-49vv-p3mr
nvd.nist.gov/vuln/detail/CVE-2023-39343