GHSA-7w2c-w47h-789w

Suggest an improvement
Source
https://github.com/advisories/GHSA-7w2c-w47h-789w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-7w2c-w47h-789w/GHSA-7w2c-w47h-789w.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-7w2c-w47h-789w
Aliases
Published
2023-06-12T19:50:34Z
Modified
2024-12-09T06:59:51.209469Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Doorkeeper Improper Authentication vulnerability
Details

OAuth RFC 8252 says https://www.rfc-editor.org/rfc/rfc8252#section-8.6

the authorization server SHOULD NOT process authorization requests automatically without user consent or interaction, except when the identity of the client can be assured. This includes the case where the user has previously approved an authorization request for a given client id

But Doorkeeper automatically processes authorization requests without user consent for public clients that have been previously approved. Public clients are inherently vulnerable to impersonation, their identity cannot be assured.

Issue https://github.com/doorkeeper-gem/doorkeeper/issues/1589

Fix https://github.com/doorkeeper-gem/doorkeeper/pull/1646

Database specific
{
    "nvd_published_at": "2023-06-12T17:15:09Z",
    "cwe_ids": [
        "CWE-287"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-06-12T19:50:34Z"
}
References

Affected packages

RubyGems / doorkeeper

Package

Name
doorkeeper
Purl
pkg:gem/doorkeeper

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.6.6

Affected versions

0.*

0.1.0
0.1.1
0.2.0
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.4.0
0.4.1
0.4.2
0.5.0.rc1
0.5.0
0.6.0.rc1
0.6.0
0.6.1
0.6.2
0.6.3
0.6.4
0.6.5
0.6.6
0.6.7
0.7.0
0.7.1
0.7.2
0.7.3
0.7.4

1.*

1.0.0.rc1
1.0.0.rc2
1.0.0
1.1.0
1.2.0
1.3.0
1.3.1
1.4.0
1.4.1
1.4.2

2.*

2.0.0.alpha1
2.0.0.rc2
2.0.0.rc3
2.0.0
2.0.1
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.2.0
2.2.1
2.2.2

3.*

3.0.0.rc1
3.0.0.rc2
3.0.0
3.0.1
3.1.0

4.*

4.0.0.rc1
4.0.0.rc2
4.0.0.rc3
4.0.0.rc4
4.0.0
4.1.0
4.2.0
4.2.5
4.2.6
4.3.0
4.3.1
4.3.2
4.4.0
4.4.1
4.4.2
4.4.3

5.*

5.0.0.rc1
5.0.0.rc2
5.0.0
5.0.1
5.0.2
5.0.3
5.1.0.rc1
5.1.0.rc2
5.1.0
5.1.1
5.1.2
5.2.0.rc1
5.2.0.rc2
5.2.0.rc3
5.2.0
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.3.0
5.3.1
5.3.2
5.3.3
5.4.0.rc1
5.4.0.rc2
5.4.0
5.5.0.rc1
5.5.0.rc2
5.5.0
5.5.1
5.5.2
5.5.3
5.5.4
5.6.0.rc1
5.6.0.rc2
5.6.0
5.6.1
5.6.2
5.6.3
5.6.4
5.6.5