漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Discoverability of user password hash in Statamic CMS
Vulnerability Description
Statamic is a Laravel and Git powered CMS. Before versions 3.2.39 and 3.3.2, it is possible to confirm a single character of a user's password hash using a specially crafted regular expression filter in the users endpoint of the REST API. Multiple such requests can eventually uncover the entire hash. The hash is not present in the response, however the presence or absence of a result confirms if the character is in the right position. The API has throttling enabled by default, making this a time intensive task. Both the REST API and the users endpoint need to be enabled, as they are disabled by default. The issue has been fixed in versions 3.2.39 and above, and 3.3.2 and above.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
信息暴露
Vulnerability Title
Statamic 加密问题漏洞
Vulnerability Description
Statamic是美国Statamic公司的一个基于 Laravel 构建的强大的平面文件 Cms。用于将所有内容、模板、资产和设置存储在文件而不是数据库中。 Statamic存在安全漏洞,该漏洞源于在版本 3.2.39 和 3.3.2 之前,可以在 REST API 的用户端点中使用特制的正则表达式过滤器来确认用户密码哈希的单个字符。多个这样的请求最终可以发现整个散列。响应中不存在哈希,但是结果的存在或不存在确认字符是否在正确的位置。默认情况下,API 已启用节流,因此这是一项耗时的任务。 REST A
CVSS Information
N/A
Vulnerability Type
N/A