CVE-2024-27090 – decidim
Package
Manager: gem
Name: decidim
Vulnerable Version: >=0 <0.27.6
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00205 pctl0.42761
Details
Decidim vulnerable to data disclosure through the embed feature ### Impact If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embedded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. ### Patches version 0.27.6 https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705 ### Workarounds Disallow access through your web server to the URLs finished with `/embed.html`
Metadata
Created: 2024-07-10T15:10:57Z
Modified: 2024-07-11T21:36:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-qcj6-vxwx-4rqv/GHSA-qcj6-vxwx-4rqv.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-qcj6-vxwx-4rqv
Finding: F017
Auto approve: 1