logo

CVE-2023-34090 decidim-meetings

Package

Manager: gem
Name: decidim-meetings
Vulnerable Version: >=0.27.0 <0.27.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00257 pctl0.48901

Details

Decidim vulnerable to sensitive data disclosure Note: added the actual report as a [comment](https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9#advisory-comment-81110). ### Summary Decidim, a platform for digital citizen participation, uses a third-party library named Ransack for filtering certain database collections (e.g., public meetings). By default, this library allows filtering on all data attributes and associations. This allows an unauthenticated remote attacker to exfiltrate non-public data from the underlying database of a Decidim instance (e.g., exfiltrating data from the user table). ### Impact This issue may lead to Sensitive Data Disclosure. ### Patches The problem was patched in [v0.27.3](https://github.com/decidim/decidim/releases/tag/v0.27.3). ### Workarounds Disable or unpublish all meetings components from your application.

Metadata

Created: 2023-07-11T22:46:51Z
Modified: 2023-07-11T22:46:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-jm79-9pm4-vrw9/GHSA-jm79-9pm4-vrw9.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-jm79-9pm4-vrw9
Finding: F038
Auto approve: 1