logo

CVE-2016-6582 doorkeeper

Package

Manager: gem
Name: doorkeeper
Vulnerable Version: >=0 <4.2.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00684 pctl0.70779

Details

Doorkeeper is vulnerable to replay attacks The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.

Metadata

Created: 2017-10-24T18:33:35Z
Modified: 2022-04-25T16:34:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-3m6r-39p3-jq25/GHSA-3m6r-39p3-jq25.json
CWE IDs: ["CWE-1254"]
Alternative ID: GHSA-3m6r-39p3-jq25
Finding: F138
Auto approve: 1