Miggo Logo

GHSA-3qmc-2r76-4rqp: Redwood is vulnerable to account takeover via dbAuth "forgot-password"

8.2

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
11/10/2022
Updated
1/7/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
@redwoodjs/apinpm>= 0.38.0, < 2.2.52.2.5
@redwoodjs/apinpm>= 3.0.0, < 3.3.13.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the forgotPassword handler returning full user records including sensitive reset credentials. The provided workaround explicitly shows modifying this handler to strip these fields, and the GitHub PR #6778 confirms the framework was patched by removing these fields from responses. Though exact framework file paths aren't shown in sources, the handler function's role in leaking credentials is clearly documented in advisories and fixes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ T*is is *n *PI vuln*r**ility in R**woo*'s [***ut*], sp**i*i**lly t** ***ut* *or*ot p*sswor* ***tur*: - only proj**ts wit* t** ***ut* "*or*ot p*sswor*" ***tur* *r* *****t** - t*is vuln*r*

Reasoning

T** vuln*r**ility st*ms *rom t** `*or*otP*sswor*` **n*l*r r*turnin* *ull us*r r**or*s in*lu*in* s*nsitiv* r*s*t *r***nti*ls. T** provi*** work*roun* *xpli*itly s*ows mo*i*yin* t*is **n*l*r to strip t**s* *i*l*s, *n* t** *it*u* PR #**** *on*irms t** *