CVE-2020-26254

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-26254
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26254.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26254
Aliases
Published
2020-12-08T15:15:11Z
Modified
2024-05-14T07:53:26.888729Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

omniauth-apple is the OmniAuth strategy for "Sign In with Apple" (RubyGem omniauth-apple). In omniauth-apple before version 1.0.1 attackers can fake their email address during authentication. This vulnerability impacts applications using the omniauth-apple strategy of OmniAuth and using the info.email field of OmniAuth's Auth Hash Schema for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users. Applications not using info.email for identification but are instead using the uid field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of info.email is being used for other purposes. Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.

References

Affected packages

Git / github.com/nhosoya/omniauth-apple

Affected ranges

Type
GIT
Repo
https://github.com/nhosoya/omniauth-apple
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.0.3

v1.*

v1.0.0