logo

CVE-2018-1000088 doorkeeper

Package

Manager: gem
Name: doorkeeper
Vulnerable Version: >=2.1.0 <4.2.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00172 pctl0.39005

Details

Doorkeeper is vulnerable to stored XSS and code execution Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.

Metadata

Created: 2018-03-13T20:44:48Z
Modified: 2022-04-26T17:36:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/03/GHSA-hwhh-2fwm-cfgw/GHSA-hwhh-2fwm-cfgw.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-hwhh-2fwm-cfgw
Finding: F425
Auto approve: 1