Skip to content

Commit

Permalink
MNT Added 5.1.0-beta1 changelog
Browse files Browse the repository at this point in the history
  • Loading branch information
GuySartorelli committed Aug 31, 2023
1 parent 61a9580 commit 1d754eb
Show file tree
Hide file tree
Showing 2 changed files with 964 additions and 15 deletions.
20 changes: 5 additions & 15 deletions en/04_Changelogs/5.1.0.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,22 +26,12 @@ This release includes several security fixes. Review the individual vulnerabilit

We have provided a severity rating of the vulnerabilities below based on the CVSS score. Note that the impact of each vulnerability could vary based on the specifics of each project. You can [read the severity rating definitions in the Silverstripe CMS release process](/contributing/release_process/#severity-rating).

- [CVE-2023-32302 - Members with no password can be created and bypass custom login forms](https://www.silverstripe.org/download/security-releases/cve-2023-32302) Severity: Low
When a new `Member` record was created in the cms it was possible to set a blank password. If an attacker knows the email address of the user with the blank password then they can attempt to log in using an empty password. The default member authenticator, login form and basic auth all require a non-empty password, however if a custom authentication method is used it may allow a successful login with the empty password. Starting with this release, blank passwords are no no longer allowed when members are created in the CMS. Programatically created `Member` records, such as those used in unit tests, still allow blank passwords. You may have some `Member` records in your system already which have empty passwords. To detect these, you can loop over all `Member` records with `Member::get()` and pass each record into the below method. It might be sensible to create a [`BuildTask`](api:SilverStripe\Dev\BuildTask) for this purpose.
```php
private function memberHasBlankPassword(Member $member): bool
{
// skip default admin as this is created programatically
if ($member->isDefaultAdmin()) {
return false;
}
// return true if a blank password is valid for this member
$authenticator = new MemberAuthenticator();
return $authenticator->checkPassword($member, '')->isValid();
}
```
Once you have identified the records with empty passwords, it's up to you how to handle this. The most sensible way to resolve this is probably to generate a new secure password for each of these members, mark it as immediately expired, and email each affected member (assuming they have a valid email address in the system).
### Released on July 31 2023

A patch for the following security vulnerability was released on July 31 2023. You can learn more about this in the [blog post about this patch](https://www.silverstripe.org/blog/silverstripe-cms-security-patches/). Note that there was also a patch for a vulnerability that only affected Silverstripe CMS 4 released on the same day, which you can read about in that blog post.

- [CVE-2023-32302 - Members with no password can be created and bypass custom login forms](https://www.silverstripe.org/download/security-releases/cve-2023-32302) Severity: None
When a new `Member` record was created in the cms it was possible to set a blank password. If an attacker knows the email address of the user with the blank password then they can attempt to log in using an empty password. The default member authenticator, login form and basic auth all require a non-empty password, however if a custom authentication method is used it may allow a successful login with the empty password. See the security advisory for more information including how to identify affected `Member` records.

## Features and enhancements

Expand Down
Loading

0 comments on commit 1d754eb

Please sign in to comment.