Логотип exploitDog
bind:CVE-2023-45814
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-45814

Количество 2

Количество 2

nvd логотип

CVE-2023-45814

больше 2 лет назад

Bunkum is an open-source protocol-agnostic request server for custom game servers. First, a little bit of background. So, in the beginning, Bunkum's `AuthenticationService` only supported injecting `IUser`s. However, as Refresh and SoundShapesServer implemented permissions systems support for injecting `IToken`s into endpoints was added. All was well until 4.0. Bunkum 4.0 then changed to enforce relations between `IToken`s and `IUser`s. This wasn't implemented in a very good way in the `AuthenticationService`, and ended up breaking caching in such a way that cached tokens would persist after the lifetime of the request - since we tried to cache both tokens and users. From that point until now, from what I understand, Bunkum was attempting to use that cached token at the start of the next request once cached. Naturally, when that token expired, downstream projects like Refresh would remove the object from Realm - and cause the object in the cache to be in a detached state, causing an ex

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-jrf2-h5j6-3rrq

больше 2 лет назад

Bunkum tokens cached in the AuthenticationService are susceptible to a use-after-free

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-45814

Bunkum is an open-source protocol-agnostic request server for custom game servers. First, a little bit of background. So, in the beginning, Bunkum's `AuthenticationService` only supported injecting `IUser`s. However, as Refresh and SoundShapesServer implemented permissions systems support for injecting `IToken`s into endpoints was added. All was well until 4.0. Bunkum 4.0 then changed to enforce relations between `IToken`s and `IUser`s. This wasn't implemented in a very good way in the `AuthenticationService`, and ended up breaking caching in such a way that cached tokens would persist after the lifetime of the request - since we tried to cache both tokens and users. From that point until now, from what I understand, Bunkum was attempting to use that cached token at the start of the next request once cached. Naturally, when that token expired, downstream projects like Refresh would remove the object from Realm - and cause the object in the cache to be in a detached state, causing an ex

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-jrf2-h5j6-3rrq

Bunkum tokens cached in the AuthenticationService are susceptible to a use-after-free

CVSS3: 5.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу