Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7vx-8mqj-cqp9

Опубликовано: 07 мая 2020
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper

Impact

Information disclosure vulnerability. Allows an attacker to see all Doorkeeper::Application model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json).

Patches

These versions have the fix:

  • 5.0.3
  • 5.1.1
  • 5.2.5
  • 5.3.2

Workarounds

Patch Doorkeeper::Application model #as_json(options = {}) method and define only those attributes you want to expose.

Additional recommended hardening is to enable application secrets hashing (guide), available since Doorkeeper 5.1. This would render the exposed secret useless.

References

Пакеты

Наименование

doorkeeper

rubygems
Затронутые версииВерсия исправления

>= 5.0.0, < 5.0.3

5.0.3

Наименование

doorkeeper

rubygems
Затронутые версииВерсия исправления

= 5.1.0

5.1.1

Наименование

doorkeeper

rubygems
Затронутые версииВерсия исправления

>= 5.2.0, < 5.2.5

5.2.5

Наименование

doorkeeper

rubygems
Затронутые версииВерсия исправления

>= 5.3.0, < 5.3.2

5.3.2

EPSS

Процентиль: 62%
0.00425
Низкий

7.5 High

CVSS3

Дефекты

CWE-862

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.

CVSS3: 7.5
nvd
почти 6 лет назад

Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.

CVSS3: 7.5
debian
почти 6 лет назад

Doorkeeper version 5.0.0 and later contains an information disclosure ...

EPSS

Процентиль: 62%
0.00425
Низкий

7.5 High

CVSS3

Дефекты

CWE-862