CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.9%
What kind of vulnerability is it? Who is impacted?
Original Report:
> The Oauth2 PKCE implementation is vulnerable in 2 ways:
> 1. The authCodeVerifier
should be removed after usage (similar to ‘authState’)
> 2. There is a risk for a “downgrade attack” if PKCE is being relied on for CSRF protection.
Has the problem been patched? What versions should users upgrade to?
2.2.15
Is there a way for users to fix or remediate the vulnerability without upgrading?
not known yet.
Are there any links users can visit to find out more?
github.com/yiisoft/yii2-authclient
github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158
github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121
github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420
github.com/yiisoft/yii2-authclient/commit/721ed974bc44137437b0cdc8454e137fff8db213
github.com/yiisoft/yii2-authclient/security/advisories/GHSA-rw54-6826-c8j5
nvd.nist.gov/vuln/detail/CVE-2023-50714
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.9%