Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embbeded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. This vulnerability is fixed in 0.27.6.
References
Configurations
No configuration.
History
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705 - | |
References | () https://github.com/decidim/decidim/pull/12528 - | |
References | () https://github.com/decidim/decidim/releases/tag/v0.27.6 - | |
References | () https://github.com/decidim/decidim/security/advisories/GHSA-qcj6-vxwx-4rqv - |
11 Jul 2024, 13:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-10 19:15
Updated : 2024-11-21 09:03
NVD link : CVE-2024-27090
Mitre link : CVE-2024-27090
CVE.ORG link : CVE-2024-27090
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor