CVE-2019-16764

The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
Configurations

Configuration 1 (hide)

cpe:2.3:a:powauth:powassent:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1 - Product () http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1 - Product
References () https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf - Patch () https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf - Patch
References () https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986 - Third Party Advisory () https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986 - Third Party Advisory
References () https://hex.pm/packages/pow_assent - Release Notes () https://hex.pm/packages/pow_assent - Release Notes
CVSS v2 : 2.1
v3 : 5.5
v2 : 2.1
v3 : 6.5

Information

Published : 2019-11-25 17:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16764

Mitre link : CVE-2019-16764

CVE.ORG link : CVE-2019-16764


JSON object : View

Products Affected

powauth

  • powassent
CWE
CWE-400

Uncontrolled Resource Consumption

NVD-CWE-noinfo