Vulnerability Description
ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibexa | Ezplatform-Graphql | >= 1.0.0, < 1.0.13 |
Related Weaknesses (CWE)
References
- https://github.com/ezsystems/ezplatform-graphql/security/advisories/GHSA-c7pc-pgThird Party Advisory
- https://github.com/ezsystems/ezplatform-graphql/security/advisories/GHSA-c7pc-pgThird Party Advisory
FAQ
What is CVE-2022-41876?
CVE-2022-41876 is a vulnerability with a CVSS score of 7.5 (HIGH). ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated...
How severe is CVE-2022-41876?
CVE-2022-41876 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41876?
Check the references section above for vendor advisories and patch information. Affected products include: Ibexa Ezplatform-Graphql.