CVE-2023-37260 – league/oauth2-server
Package
Manager: composer
Name: league/oauth2-server
Vulnerable Version: >=8.3.2 <8.4.2 || >=8.5.0 <8.5.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01575 pctl0.80852
Details
league/oauth2-server key exposed in exception message when passing as a string and providing an invalid pass phrase ### Impact Servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. ### Patches This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 or 8.4.2 to receive the patch. ### Workarounds We recommend upgrading the oauth2-server to one of the patched releases (8.5.3 or 8.4.2). If you are unable to upgrade you can avoid this security issue by passing your key as a file instead of a string. ### References * [Fix for 8.4.x](https://github.com/thephpleague/oauth2-server/pull/1359) * [Fix for 8.5.x](https://github.com/thephpleague/oauth2-server/pull/1353)
Metadata
Created: 2023-07-06T21:07:27Z
Modified: 2023-08-03T16:56:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-wj7q-gjg8-3cpm/GHSA-wj7q-gjg8-3cpm.json
CWE IDs: ["CWE-200", "CWE-209"]
Alternative ID: GHSA-wj7q-gjg8-3cpm
Finding: F017
Auto approve: 1