CVE-2020-10187

Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:doorkeeper_project:doorkeeper:*:*:*:*:*:ruby:*:*
cpe:2.3:a:doorkeeper_project:doorkeeper:*:*:*:*:*:ruby:*:*
cpe:2.3:a:doorkeeper_project:doorkeeper:*:*:*:*:*:ruby:*:*
cpe:2.3:a:doorkeeper_project:doorkeeper:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 04:54

Type Values Removed Values Added
References () https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6 - Patch, Third Party Advisory () https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6 - Patch, Third Party Advisory
References () https://github.com/doorkeeper-gem/doorkeeper/releases - Release Notes, Third Party Advisory () https://github.com/doorkeeper-gem/doorkeeper/releases - Release Notes, Third Party Advisory
References () https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9 - Patch, Third Party Advisory () https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9 - Patch, Third Party Advisory
References () https://github.com/rubysec/ruby-advisory-db/pull/446 - Patch, Third Party Advisory () https://github.com/rubysec/ruby-advisory-db/pull/446 - Patch, Third Party Advisory

Information

Published : 2020-05-04 14:15

Updated : 2024-11-21 04:54


NVD link : CVE-2020-10187

Mitre link : CVE-2020-10187

CVE.ORG link : CVE-2020-10187


JSON object : View

Products Affected

doorkeeper_project

  • doorkeeper
CWE
CWE-862

Missing Authorization