CVE-2020-15223

In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.34.0, the `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. This is fixed in version 0.34.0
Configurations

Configuration 1 (hide)

cpe:2.3:a:ory:fosite:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
References () https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319 - Patch, Third Party Advisory () https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319 - Patch, Third Party Advisory
References () https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm - Third Party Advisory () https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm - Third Party Advisory
References () https://tools.ietf.org/html/rfc7009#section-2.2.1 - Third Party Advisory () https://tools.ietf.org/html/rfc7009#section-2.2.1 - Third Party Advisory

Information

Published : 2020-09-24 17:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15223

Mitre link : CVE-2020-15223

CVE.ORG link : CVE-2020-15223


JSON object : View

Products Affected

ory

  • fosite
CWE
CWE-755

Improper Handling of Exceptional Conditions

CWE-754

Improper Check for Unusual or Exceptional Conditions