Headline
GHSA-gvj8-4cj4-h776: Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-gvj8-4cj4-h776
Object state limitation has no effect
Critical severity GitHub Reviewed Published Apr 29, 2022 in ibexa/core • Updated Apr 29, 2022
Vulnerability details Dependabot alerts 0
Package
composer ibexa/core (Composer )
Affected versions
>= 4.0.0, < 4.0.5
>= 4.1.0, < 4.1.2
Patched versions
4.0.5
4.1.2
Description
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
References
- GHSA-gvj8-4cj4-h776
- https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge
glye published the maintainer security advisory
Apr 28, 2022
Severity
Critical
Weaknesses
CWE-281
CVE ID
No known CVE
GHSA ID
GHSA-gvj8-4cj4-h776
Source code
ibexa/core
See something to contribute? Suggest improvements for this vulnerability.
Related news
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.