Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-9cvc-v7wm-992c: When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible

Summary

When ui.isAccessAllowed is undefined, the adminMeta GraphQL query is publicly accessible, that is to say, no session is required for the query.

This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a session strategy is not defined.

Impact

This vulnerability does not affect developers using the @keystone-6/auth package, or any users that have written their own ui.isAccessAllowed (that is to say, you are unaffected if ui.isAccessAllowed is defined).

This vulnerability does affect developers who thought that their session strategy will, by default, enforce that adminMeta is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware.

Patches

This vulnerability has been patched in @keystone-6/core version 5.5.1.

Workarounds

You can opt to write your own isAccessAllowed to work-around this vulnerability.

References

Pull request https://github.com/keystonejs/keystone/pull/8771

ghsa
#vulnerability#nodejs#js#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-40027

When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible

Moderate severity GitHub Reviewed Published Aug 15, 2023 in keystonejs/keystone • Updated Aug 15, 2023

Package

npm @keystone-6/core (npm)

Affected versions

< 5.5.1

Summary

When ui.isAccessAllowed is undefined, the adminMeta GraphQL query is publicly accessible, that is to say, no session is required for the query.

This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a session strategy is not defined.

Impact

This vulnerability does not affect developers using the @keystone-6/auth package, or any users that have written their own ui.isAccessAllowed (that is to say, you are unaffected if ui.isAccessAllowed is defined).

This vulnerability does affect developers who thought that their session strategy will, by default, enforce that adminMeta is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware.

Patches

This vulnerability has been patched in @keystone-6/core version 5.5.1.

Workarounds

You can opt to write your own isAccessAllowed to work-around this vulnerability.

References

Pull request keystonejs/keystone#8771

References

  • GHSA-9cvc-v7wm-992c
  • https://nvd.nist.gov/vuln/detail/CVE-2023-40027
  • keystonejs/keystone#8771
  • keystonejs/keystone@650e27e
  • https://github.com/keystonejs/keystone/releases/tag/2023-08-15

Published to the GitHub Advisory Database

Aug 15, 2023

Last updated

Aug 15, 2023

Related news

CVE-2023-40027: Fix `ui.isAccessAllowed` when `undefined` to prevent access by dcousens · Pull Request #8771 · keystonejs/keystone

Keystone is an open source headless CMS for Node.js — built with GraphQL and React. When `ui.isAccessAllowed` is set as `undefined`, the `adminMeta` GraphQL query is publicly accessible (no session required). This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible (no session required) if a `session` strategy is not defined. This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, `isAccessAllowed` is not `undefined`). This vulnerability does affect users who believed that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. Users are advised to upgrade. Users unable to upgrade may opt to write their own `isAccessAllowe...

ghsa: Latest News

GHSA-8gc2-vq6m-rwjw: Amazon Redshift Python Connector vulnerable to SQL Injection