Lucene search

K
osvGoogleOSV:GHSA-J7VX-8MQJ-CQP9
HistoryMay 07, 2020 - 9:11 p.m.

Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper

2020-05-0721:11:07
Google
osv.dev
8

0.001 Low

EPSS

Percentile

51.1%

Impact

Information disclosure vulnerability. Allows an attacker to see all Doorkeeper::Application model attribute values (including secrets) using authorized applications controller if it’s enabled (GET /oauth/authorized_applications.json).

Patches

These versions have the fix:

  • 5.0.3
  • 5.1.1
  • 5.2.5
  • 5.3.2

Workarounds

Patch Doorkeeper::Application model #as_json(options = {}) method and define only those attributes you want to expose.

Additional recommended hardening is to enable application secrets hashing (guide), available since Doorkeeper 5.1. This would render the exposed secret useless.

References

0.001 Low

EPSS

Percentile

51.1%