GHSA-99j7-mhfh-w84p

Suggest an improvement
Source
https://github.com/advisories/GHSA-99j7-mhfh-w84p
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-99j7-mhfh-w84p/GHSA-99j7-mhfh-w84p.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-99j7-mhfh-w84p
Aliases
Published
2022-07-20T01:30:21Z
Modified
2023-11-08T04:09:28.280996Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Slack Morphism for Rust before 0.41.0 can leak Slack OAuth client information in application debug logs
Details

Impact

Potential/accidental leaking of Slack OAuth client information in application debug logs.

Patches

More strict and secure debug formatting was introduced in v0.41 for OAuth secret types to avoid the possibility of printing sensitive information in application logs.

Workarounds

Don't print/output in logs request and responses for OAuth and client configurations.

For more information

If you have any questions or comments about this advisory: * Open an issue in the repo * Email us at me@abdolence.dev

Database specific
{
    "nvd_published_at": "2022-07-22T04:15:00Z",
    "cwe_ids": [
        "CWE-1258",
        "CWE-200",
        "CWE-212"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-20T01:30:21Z"
}
References

Affected packages

crates.io / slack-morphism

Package

Name
slack-morphism
View open source insights on deps.dev
Purl
pkg:cargo/slack-morphism

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.41.0