In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade @keystone-6/core
to version 6.5.0 or higher.
Affected versions of this package are vulnerable to Information Exposure when applying isFilterable
to sensitive data. By adding malicious uniqueness filters to the where
clause of an update
or delete
operation, a user can infer the presence of specific values in records the user does not have permission to read.
Note: This vulnerability has no impact on fields to which isFilterable: false
or defaultIsFilterable: false
are applied.
This vulnerability can be avoided by any of the following means:
setting isFilterable: false
statically for sensitive fields
setting {field}.graphql.omit.read: true
for sensitive fields
denying all update
and delete
operations for the lists containing sensitive values