GHSA-67g8-c724-8mp3

Suggest an improvement
Source
https://github.com/advisories/GHSA-67g8-c724-8mp3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-67g8-c724-8mp3/GHSA-67g8-c724-8mp3.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-67g8-c724-8mp3
Aliases
Published
2023-03-16T17:22:17Z
Modified
2023-11-01T05:01:38.862795Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
DDOS attack on graphql endpoints
Details

An attacker could use a specially crafted graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed and particularly large/complex graphql schemas.

If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this will likely further mitigate the risk.

Upgrade to silverstripe/graphql 4.2.3 or 4.1.2 or above to remedy the vulnerability.

Database specific
{
    "nvd_published_at": "2023-03-16T16:15:00Z",
    "github_reviewed_at": "2023-03-16T17:22:17Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-770"
    ]
}
References

Affected packages

Packagist / silverstripe/graphql

Package

Name
silverstripe/graphql
Purl
pkg:composer/silverstripe/graphql

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.1
Fixed
4.1.2

Affected versions

4.*

4.1.1

Packagist / silverstripe/graphql

Package

Name
silverstripe/graphql
Purl
pkg:composer/silverstripe/graphql

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.2
Fixed
4.2.3

Affected versions

4.*

4.2.2