GHSA-rw54-6826-c8j5

Suggest an improvement
Source
https://github.com/advisories/GHSA-rw54-6826-c8j5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-rw54-6826-c8j5/GHSA-rw54-6826-c8j5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rw54-6826-c8j5
Aliases
Published
2023-12-18T19:34:20Z
Modified
2024-02-16T08:08:00.818252Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
yiisoft/yii2-authclient's Oauth2 PKCE implementation is vulnerable
Details

Impact

What kind of vulnerability is it? Who is impacted?

Original Report:

The Oauth2 PKCE implementation is vulnerable in 2 ways: 1. The authCodeVerifier should be removed after usage (similar to 'authState') 2. There is a risk for a "downgrade attack" if PKCE is being relied on for CSRF protection.

Patches

Has the problem been patched? What versions should users upgrade to?

2.2.15

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

not known yet.

References

Are there any links users can visit to find out more?

Database specific
{
    "nvd_published_at": "2023-12-22T19:15:09Z",
    "cwe_ids": [
        "CWE-287",
        "CWE-347"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-12-18T19:34:20Z"
}
References

Affected packages

Packagist / yiisoft/yii2-authclient

Package

Name
yiisoft/yii2-authclient
Purl
pkg:composer/yiisoft/yii2-authclient

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.15

Affected versions

2.*

2.0.0-beta
2.0.0-rc
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.1.8
2.2.0
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.2.8
2.2.9
2.2.10
2.2.11
2.2.12
2.2.13
2.2.14