logo

CVE-2023-37260 league/oauth2-server

Package

Manager: composer
Name: league/oauth2-server
Vulnerable Version: >=8.3.2 <8.4.2 || >=8.5.0 <8.5.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01575 pctl0.80852

Details

league/oauth2-server key exposed in exception message when passing as a string and providing an invalid pass phrase ### Impact Servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. ### Patches This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 or 8.4.2 to receive the patch. ### Workarounds We recommend upgrading the oauth2-server to one of the patched releases (8.5.3 or 8.4.2). If you are unable to upgrade you can avoid this security issue by passing your key as a file instead of a string. ### References * [Fix for 8.4.x](https://github.com/thephpleague/oauth2-server/pull/1359) * [Fix for 8.5.x](https://github.com/thephpleague/oauth2-server/pull/1353)

Metadata

Created: 2023-07-06T21:07:27Z
Modified: 2023-08-03T16:56:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-wj7q-gjg8-3cpm/GHSA-wj7q-gjg8-3cpm.json
CWE IDs: ["CWE-200", "CWE-209"]
Alternative ID: GHSA-wj7q-gjg8-3cpm
Finding: F017
Auto approve: 1