CVE-2023-34090 – decidim
Package
Manager: gem
Name: decidim
Vulnerable Version: >=0.27.0 <0.27.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00257 pctl0.48917
Details
Decidim vulnerable to sensitive data disclosure Note: added the actual report as a [comment](https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9#advisory-comment-81110). ### Summary Decidim, a platform for digital citizen participation, uses a third-party library named Ransack for filtering certain database collections (e.g., public meetings). By default, this library allows filtering on all data attributes and associations. This allows an unauthenticated remote attacker to exfiltrate non-public data from the underlying database of a Decidim instance (e.g., exfiltrating data from the user table). ### Impact This issue may lead to Sensitive Data Disclosure. ### Patches The problem was patched in [v0.27.3](https://github.com/decidim/decidim/releases/tag/v0.27.3). ### Workarounds Disable or unpublish all meetings components from your application.
Metadata
Created: 2023-07-11T22:46:51Z
Modified: 2023-07-11T22:46:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-jm79-9pm4-vrw9/GHSA-jm79-9pm4-vrw9.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-jm79-9pm4-vrw9
Finding: F038
Auto approve: 1