Skip to main content

CVE-2022-41876: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in ezsystems ezplatform-graphql

Medium
Published: Thu Nov 10 2022 (11/10/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: ezsystems
Product: ezplatform-graphql

Description

ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.

AI-Powered Analysis

AILast updated: 06/22/2025, 14:05:21 UTC

Technical Analysis

CVE-2022-41876 is a vulnerability affecting ezsystems' ezplatform-graphql, a GraphQL server implementation used within Ibexa DXP and Ibexa Open Source platforms. The flaw exists in versions prior to 2.3.12 and 1.0.13, where unauthenticated GraphQL queries can expose sensitive user information, specifically password hashes of users who have created or modified content, including administrators and editors. This exposure results from insecure storage and improper access control of sensitive data fields within the GraphQL schema, particularly the "passwordHash" attribute defined in the User.types.yaml configuration file. Because the GraphQL API allows unauthenticated queries to retrieve this information, attackers can harvest password hashes without any authentication or user interaction. Although the password hashes themselves are not plaintext passwords, their exposure significantly increases the risk of offline brute-force or rainbow table attacks to recover user credentials. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-922 (Insecure Storage of Sensitive Information). The issue was patched in versions 2.3.12 and 1.0.13. For users unable to upgrade, a recommended mitigation is to manually remove the "passwordHash" field and other sensitive properties such as hash type, email, and login from the GraphQL schema configuration file to prevent their exposure via unauthenticated queries. There are no known exploits in the wild reported to date, but the vulnerability's nature makes it a significant risk if left unpatched, especially in environments with privileged users whose credentials could be targeted.

Potential Impact

For European organizations using Ibexa DXP or Ibexa Open Source platforms with vulnerable versions of ezplatform-graphql, this vulnerability poses a moderate to high risk. Exposure of password hashes of privileged users (administrators and editors) can lead to credential compromise through offline cracking attempts. Successful credential theft could result in unauthorized access to critical content management systems, enabling attackers to manipulate, delete, or exfiltrate sensitive business information. This could disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR requirements concerning data protection and breach notification. The vulnerability's exploitation does not require authentication or user interaction, increasing the attack surface and ease of exploitation. Although no active exploits are known, the presence of exposed password hashes can facilitate targeted attacks against high-value accounts. Organizations operating in sectors with high-value content or sensitive data, such as media, publishing, government, and e-commerce, are particularly at risk. Additionally, the exposure of user emails and login names (if not mitigated) can aid social engineering or phishing campaigns.

Mitigation Recommendations

1. Immediate upgrade to ezplatform-graphql versions 2.3.12 or 1.0.13 to apply the official patch that removes exposure of sensitive fields. 2. For organizations unable to upgrade promptly, manually edit the GraphQL schema configuration file (src/bundle/Resources/config/graphql/User.types.yaml) to remove the "passwordHash" field and other sensitive attributes such as email, login, and hash type to prevent their exposure. 3. Implement network-level access controls to restrict access to the GraphQL endpoint, limiting it to trusted internal networks or authenticated users only. 4. Monitor GraphQL API logs for unusual or excessive unauthenticated queries that may indicate reconnaissance or exploitation attempts. 5. Enforce strong password policies and consider multi-factor authentication for privileged accounts to mitigate risks from potential credential compromise. 6. Regularly audit user accounts and permissions within Ibexa platforms to ensure least privilege principles are applied. 7. Educate administrators and editors about phishing and credential security to reduce the risk of credential misuse. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious GraphQL queries targeting sensitive fields.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf4a68

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 2:05:21 PM

Last updated: 8/4/2025, 1:03:49 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats