
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The vulnerability (GHSA-7m2v-x7rg-5hm5) affects the SilverStripe framework, specifically versions 3.5.0-rc1 to 3.5.5 and 3.6.0-rc1 to 3.6.2. The issue was discovered in 2017 and allows user enumeration through timing attacks on login and password reset forms. The vulnerability was patched in versions 3.5.5 and 3.6.2 (GitHub Advisory, SilverStripe Advisory).
The vulnerability stems from timing differences in the processing of login and password reset requests, which could be exploited to perform timing attacks. The issue was addressed by implementing a minimum execution time for authentication processes, set to 350 milliseconds, to prevent timing-based enumeration attacks (Framework Commit).
An attacker could potentially enumerate valid user accounts in the system by analyzing the response times of login and password reset attempts. This information could be used as a stepping stone for further attacks such as brute force attempts or targeted phishing campaigns (SilverStripe Advisory).
The recommended mitigation is to upgrade to the patched versions: SilverStripe Framework 3.5.5 or 3.6.2. The fix implements a minimum authentication time to prevent timing attacks (Framework Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”