CVE-2016-6582 – doorkeeper
Package
Manager: gem
Name: doorkeeper
Vulnerable Version: >=0 <4.2.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00684 pctl0.70779
Details
Doorkeeper is vulnerable to replay attacks The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
Metadata
Created: 2017-10-24T18:33:35Z
Modified: 2022-04-25T16:34:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-3m6r-39p3-jq25/GHSA-3m6r-39p3-jq25.json
CWE IDs: ["CWE-1254"]
Alternative ID: GHSA-3m6r-39p3-jq25
Finding: F138
Auto approve: 1