5
CVSSv2

CVE-2018-1000211

Published: 13/07/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

doorkeeper project doorkeeper

Vendor Advisories

Debian Bug report logs - #903980 ruby-doorkeeper: CVE-2018-1000211: Public apps can't revoke OAuth access & refresh tokens in Doorkeeper Package: src:ruby-doorkeeper; Maintainer for src:ruby-doorkeeper is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccors ...

Mailing Lists

Good morning everyone, A security bulletin for all of you Software: -------- Doorkeeper (githubcom/doorkeeper-gem/doorkeeper) Description: ---------- Doorkeeper is an OAuth 2 provider for Rails written in Ruby Affected Versions: --------------- 420 - 432 500rc1 Fixed Versions: ------------- 440 500rc2 Problem: -------- ...