Description
In Elide before 4.5.14, it is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field. Resolved in Elide 4.5.14 and greater.
Remediation
References
https://github.com/yahoo/elide/pull/1236
https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc
https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v
Related Vulnerabilities
CVE-2021-25122 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2019-15488 Vulnerability in maven package org.igniterealtime.openfire:xmppserver
CVE-2020-26274 Vulnerability in npm package systeminformation
CVE-2021-23346 Vulnerability in npm package html-parse-stringify2
CVE-2021-41182 Vulnerability in maven package org.webjars.npm:jquery-ui