Количество 2
Количество 2
CVE-2024-21632
omniauth-microsoft_graph provides an Omniauth strategy for the Microsoft Graph API. Prior to versions 2.0.0, the implementation did not validate the legitimacy of the `email` attribute of the user nor did it give/document an option to do so, making it susceptible to nOAuth misconfiguration in cases when the `email` is used as a trusted user identifier. This could lead to account takeover. Version 2.0.0 contains a fix for this issue.
GHSA-5g66-628f-7cvj
Omniauth::MicrosoftGraph Account takeover (nOAuth)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-21632 omniauth-microsoft_graph provides an Omniauth strategy for the Microsoft Graph API. Prior to versions 2.0.0, the implementation did not validate the legitimacy of the `email` attribute of the user nor did it give/document an option to do so, making it susceptible to nOAuth misconfiguration in cases when the `email` is used as a trusted user identifier. This could lead to account takeover. Version 2.0.0 contains a fix for this issue. | CVSS3: 8.6 | 0% Низкий | около 2 лет назад | |
GHSA-5g66-628f-7cvj Omniauth::MicrosoftGraph Account takeover (nOAuth) | CVSS3: 8.6 | 0% Низкий | около 2 лет назад |
Уязвимостей на страницу