CVE-2022-31162 – slack-morphism
Package
Manager: cargo
Name: slack-morphism
Vulnerable Version: >=0 <0.41.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00371 pctl0.58103
Details
Slack Morphism for Rust before 0.41.0 can leak Slack OAuth client information in application debug logs ### Impact Potential/accidental leaking of Slack OAuth client information in application debug logs. ### Patches More strict and secure debug formatting was introduced in v0.41 for OAuth secret types to avoid the possibility of printing sensitive information in application logs. ### Workarounds Don't print/output in logs request and responses for OAuth and client configurations. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [repo](https://github.com/abdolence/slack-morphism-rust) * Email us at [me@abdolence.dev](mailto:me@abdolence.dev)
Metadata
Created: 2022-07-20T01:30:21Z
Modified: 2022-08-10T23:31:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-99j7-mhfh-w84p/GHSA-99j7-mhfh-w84p.json
CWE IDs: ["CWE-1258", "CWE-200", "CWE-212"]
Alternative ID: GHSA-99j7-mhfh-w84p
Finding: F017
Auto approve: 1