Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000088

Опубликовано: 13 мар. 2018
Источник: debian

Описание

Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link.. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-doorkeeperfixed4.3.1-1package
ruby-doorkeeperignoredstretchpackage

Примечания

  • https://github.com/doorkeeper-gem/doorkeeper/issues/969

  • https://github.com/doorkeeper-gem/doorkeeper/commit/7b1a8373ecd69768c896000c7971dbf48948c1b5 (v4.2.6)

  • https://blog.justinbull.ca/cve-2018-1000088-stored-xss-in-doorkeeper/

  • Most reverse dependencies need to manual update their templates

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 8 лет назад

Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link.. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.

CVSS3: 6.1
nvd
почти 8 лет назад

Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link.. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.

CVSS3: 6.1
github
почти 8 лет назад

Doorkeeper is vulnerable to stored XSS and code execution