ghsa-jm9m-rqr3-wfmh
Vulnerability from github
8.8 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
TL;DR
This vulnerability affects all Kirby sites with enabled languages
option that might have potential attackers in the group of authenticated Panel users.
If you have disabled the languages
and/or api
option and don't call any methods in your code that cause a write access to languages (language creation, update or deletion), your site is not affected.
Introduction
Kirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions.
Permissions for creating and deleting languages have already existed and could be configured, but were not enforced by Kirby's frontend or backend code.
A permission for updating existing languages has not existed before the patched versions. So disabling the languages.*
wildcard permission for a role could not have prohibited updates to existing language definitions.
Impact
The missing permission checks allowed attackers with Panel access to manipulate the language definitions.
The language definitions are at the core of multi-language content in Kirby. Unauthorized modifications with malicious intent can cause significant damage, for example:
- If the
languages
option was enabled but no language exists, creating the first language will switch Kirby to multi-language mode. - Deleting an existing language will lead to content loss of all translated content in that language. Deleting the last language will switch Kirby to single-language mode.
- Updating a language allows to change the metadata including the language slug (used in page URLs) and language variables. It also allows to change the default language, which will cause Kirby to use the new default language's content as a fallback for non-existing translations.
Depending on the site code, the result of such actions can cause loss of site availability (e.g. error messages in the site frontend) or integrity (due to changed URLs or removed translations).
Patches
The problem has been patched in Kirby 3.6.6.6, Kirby 3.7.5.5, Kirby 3.8.4.4, Kirby 3.9.8.2, Kirby 3.10.1.1, and Kirby 4.3.1. Please update to one of these or a later version to fix the vulnerability.
In all of the mentioned releases, we have added checks for the languages.create
and languages.delete
permissions that ensure that users without those permissions cannot perform the respective actions. We have also added a new languages.update
permission.
Credits
Thanks to Sebastian Eberlein of JUNO (@SebastianEberlein-JUNO) for reporting the identified issue.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 3.6.6.5" }, "package": { "ecosystem": "Packagist", "name": "getkirby/cms" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.6.6.6" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 3.7.5.4" }, "package": { "ecosystem": "Packagist", "name": "getkirby/cms" }, "ranges": [ { "events": [ { "introduced": "3.7.0" }, { "fixed": "3.7.5.5" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 3.8.4.3" }, "package": { "ecosystem": "Packagist", "name": "getkirby/cms" }, "ranges": [ { "events": [ { "introduced": "3.8.0" }, { "fixed": "3.8.4.4" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 3.9.8.1" }, "package": { "ecosystem": "Packagist", "name": "getkirby/cms" }, "ranges": [ { "events": [ { "introduced": "3.9.0" }, { "fixed": "3.9.8.2" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 3.10.1" }, "package": { "ecosystem": "Packagist", "name": "getkirby/cms" }, "ranges": [ { "events": [ { "introduced": "3.10.0" }, { "fixed": "3.10.1.1" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 4.3.0" }, "package": { "ecosystem": "Packagist", "name": "getkirby/cms" }, "ranges": [ { "events": [ { "introduced": "4.0.0" }, { "fixed": "4.3.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-41964" ], "database_specific": { "cwe_ids": [ "CWE-863" ], "github_reviewed": true, "github_reviewed_at": "2024-08-29T17:55:30Z", "nvd_published_at": "2024-08-29T17:15:07Z", "severity": "HIGH" }, "details": "### TL;DR\n\nThis vulnerability affects all Kirby sites with enabled `languages` option that might have potential attackers in the group of authenticated Panel users.\n\nIf you have disabled the `languages` and/or `api` option and don\u0027t call any methods in your code that cause a write access to languages (language creation, update or deletion), your site is *not* affected.\n\n----\n\n### Introduction\n\nKirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions.\n\nPermissions for creating and deleting languages have already existed and could be configured, but were not enforced by Kirby\u0027s frontend or backend code.\n\nA permission for updating existing languages has not existed before the patched versions. So disabling the `languages.*` wildcard permission for a role could not have prohibited updates to existing language definitions.\n\n### Impact\n\nThe missing permission checks allowed attackers with Panel access to manipulate the language definitions.\n\nThe language definitions are at the core of multi-language content in Kirby. Unauthorized modifications with malicious intent can cause significant damage, for example:\n\n- If the `languages` option was enabled but no language exists, creating the first language will switch Kirby to multi-language mode.\n- Deleting an existing language will lead to content loss of all translated content in that language. Deleting the last language will switch Kirby to single-language mode.\n- Updating a language allows to change the metadata including the language slug (used in page URLs) and language variables. It also allows to change the default language, which will cause Kirby to use the new default language\u0027s content as a fallback for non-existing translations.\n\nDepending on the site code, the result of such actions can cause loss of site availability (e.g. error messages in the site frontend) or integrity (due to changed URLs or removed translations).\n\n### Patches\n\nThe problem has been patched in [Kirby 3.6.6.6](https://github.com/getkirby/kirby/releases/tag/3.6.6.6), [Kirby 3.7.5.5](https://github.com/getkirby/kirby/releases/tag/3.7.5.5), [Kirby 3.8.4.4](https://github.com/getkirby/kirby/releases/tag/3.8.4.4), [Kirby 3.9.8.2](https://github.com/getkirby/kirby/releases/tag/3.9.8.2), [Kirby 3.10.1.1](https://github.com/getkirby/kirby/releases/tag/3.10.1.1), and [Kirby 4.3.1](https://github.com/getkirby/kirby/releases/tag/4.3.1). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability.\n\nIn all of the mentioned releases, we have added checks for the `languages.create` and `languages.delete` permissions that ensure that users without those permissions cannot perform the respective actions. We have also added a new `languages.update` permission.\n\n### Credits\n\nThanks to Sebastian Eberlein of JUNO (@SebastianEberlein-JUNO) for reporting the identified issue.", "id": "GHSA-jm9m-rqr3-wfmh", "modified": "2024-08-29T19:07:02Z", "published": "2024-08-29T17:55:30Z", "references": [ { "type": "WEB", "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41964" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/commit/1dbc9215c97a5c22dc7f34a4e3a64d19e1eac151" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/commit/38636655b054e820f66c3b717c55a9d60fe6400a" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/commit/83fce501759782cf843b6f1d9293a7c7167e69af" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/commit/af9b0a58dea63effab85525ae217faa1f5ded423" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/commit/e647a177c75636ef4824662b2ce00d8e5c3a8406" }, { "type": "PACKAGE", "url": "https://github.com/getkirby/kirby" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/releases/tag/3.10.1.1" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/releases/tag/3.6.6.6" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/releases/tag/3.7.5.5" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/releases/tag/3.8.4.4" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/releases/tag/3.9.8.2" }, { "type": "WEB", "url": "https://github.com/getkirby/kirby/releases/tag/4.3.1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Kirby has insufficient permission checks in the language settings" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.