Headline
GHSA-9cvc-v7wm-992c: When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible
Summary
When ui.isAccessAllowed
is undefined
, the adminMeta
GraphQL query is publicly accessible, that is to say, no session is required for the query.
This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a session
strategy is not defined.
Impact
This vulnerability does not affect developers using the @keystone-6/auth
package, or any users that have written their own ui.isAccessAllowed
(that is to say, you are unaffected if ui.isAccessAllowed
is defined).
This vulnerability does affect developers who thought that their session
strategy will, by default, enforce that adminMeta
is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware.
Patches
This vulnerability has been patched in @keystone-6/core
version 5.5.1
.
Workarounds
You can opt to write your own isAccessAllowed
to work-around this vulnerability.
References
Pull request https://github.com/keystonejs/keystone/pull/8771
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-40027
When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible
Moderate severity GitHub Reviewed Published Aug 15, 2023 in keystonejs/keystone • Updated Aug 15, 2023
Package
npm @keystone-6/core (npm)
Affected versions
< 5.5.1
Summary
When ui.isAccessAllowed is undefined, the adminMeta GraphQL query is publicly accessible, that is to say, no session is required for the query.
This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a session strategy is not defined.
Impact
This vulnerability does not affect developers using the @keystone-6/auth package, or any users that have written their own ui.isAccessAllowed (that is to say, you are unaffected if ui.isAccessAllowed is defined).
This vulnerability does affect developers who thought that their session strategy will, by default, enforce that adminMeta is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware.
Patches
This vulnerability has been patched in @keystone-6/core version 5.5.1.
Workarounds
You can opt to write your own isAccessAllowed to work-around this vulnerability.
References
Pull request keystonejs/keystone#8771
References
- GHSA-9cvc-v7wm-992c
- https://nvd.nist.gov/vuln/detail/CVE-2023-40027
- keystonejs/keystone#8771
- keystonejs/keystone@650e27e
- https://github.com/keystonejs/keystone/releases/tag/2023-08-15
Published to the GitHub Advisory Database
Aug 15, 2023
Last updated
Aug 15, 2023
Related news
Keystone is an open source headless CMS for Node.js — built with GraphQL and React. When `ui.isAccessAllowed` is set as `undefined`, the `adminMeta` GraphQL query is publicly accessible (no session required). This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible (no session required) if a `session` strategy is not defined. This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, `isAccessAllowed` is not `undefined`). This vulnerability does affect users who believed that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. Users are advised to upgrade. Users unable to upgrade may opt to write their own `isAccessAllowe...