GHSA-gp2f-254m-rh32

Suggest an improvement
Source
https://github.com/advisories/GHSA-gp2f-254m-rh32
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-gp2f-254m-rh32/GHSA-gp2f-254m-rh32.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gp2f-254m-rh32
Aliases
Related
Published
2021-11-10T16:51:41Z
Modified
2023-11-08T04:06:57.422900Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Unauthorized access to data in @sap-cloud-sdk/core
Details

Impact

This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations. In some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions. By default, destination caching is disabled. If it is enabled the maximum lifetime is 5 minutes which limits the attack vector.

Patches

The problem was fixed by #1769 and #1770. The security for caching has been increased. The changes are released in version 1.52.0.

Workarounds

Disable destination caching (it is disabled by default).

References

destination cache API docs

For more information

If you have any questions or comments about this advisory: * Open an issue in https://github.com/SAP/cloud-sdk-js

Database specific
{
    "nvd_published_at": "2021-11-05T23:15:00Z",
    "github_reviewed_at": "2021-11-08T21:31:39Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

npm / @sap-cloud-sdk/core

Package

Name
@sap-cloud-sdk/core
View open source insights on deps.dev
Purl
pkg:npm/%40sap-cloud-sdk/core

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.52.0