Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rq8q-w9hr-c2fr

Опубликовано: 02 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.

Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.

EPSS

Процентиль: 25%
0.00087
Низкий

7.5 High

CVSS3

Дефекты

CWE-330

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.

EPSS

Процентиль: 25%
0.00087
Низкий

7.5 High

CVSS3

Дефекты

CWE-330