Miggo Logo

GHSA-vh7q-j8p5-2h4h: silverstripe/framework sends passwords back to browsers under some circumstances

3.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
5/27/2024
Updated
5/27/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
silverstripe/frameworkcomposer>= 3.5.5-rc1, < 3.7.03.7.0
silverstripe/frameworkcomposer>= 4.0.3-rc1, < 4.0.44.0.4
silverstripe/frameworkcomposer>= 4.1.0-rc1, < 4.1.14.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from password values being reflected in form fields after failed submissions. The patch introduced a new 'allowValuePostback' property in PasswordField.php and modified getAttributes() to conditionally include the 'value' attribute. The pre-patch version of getAttributes() would always include the submitted password value in the rendered HTML, while the patched version nullifies the 'value' attribute unless explicitly allowed. This matches the vulnerability description of passwords being reflected back to browsers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Un**r som* *ir*umst*n**s * *orm m*y popul*t* * P*sswor**i*l* wit* su*mitt** **t*, r**l**tin* su*mitt** **t* ***k to * us*r. T** us*r will only s** t**ir own su*missions *or p*sswor* **t*, w*i** is not *onsi**r** **st pr**ti**. W* *r* not *w*r* o* **t

Reasoning

T** vuln*r**ility st*ms *rom p*sswor* v*lu*s **in* r**l**t** in *orm *i*l*s **t*r **il** su*missions. T** p*t** intro*u*** * n*w '*llowV*lu*Post***k' prop*rty in `P*sswor**i*l*.p*p` *n* mo*i*i** `**t*ttri*ut*s()` to *on*ition*lly in*lu** t** 'v*lu*'