GHSA-hwhh-2fwm-cfgw

Suggest an improvement
Source
https://github.com/advisories/GHSA-hwhh-2fwm-cfgw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/03/GHSA-hwhh-2fwm-cfgw/GHSA-hwhh-2fwm-cfgw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hwhh-2fwm-cfgw
Aliases
Published
2018-03-13T20:44:48Z
Modified
2024-02-16T08:00:57.387423Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Doorkeeper is vulnerable to stored XSS and code execution
Details

Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:41:16Z"
}
References

Affected packages

RubyGems / doorkeeper

Package

Name
doorkeeper
Purl
pkg:gem/doorkeeper

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.1.0
Fixed
4.2.6

Affected versions

2.*

2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.2.0
2.2.1
2.2.2

3.*

3.0.0.rc1
3.0.0.rc2
3.0.0
3.0.1
3.1.0

4.*

4.0.0.rc1
4.0.0.rc2
4.0.0.rc3
4.0.0.rc4
4.0.0
4.1.0
4.2.0
4.2.5

Database specific

{
    "last_known_affected_version_range": "<= 4.2.5"
}