4.3
CVSSv2

CVE-2020-10187

Published: 04/05/2020 Updated: 21/07/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an malicious user to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

doorkeeper project doorkeeper

Vendor Advisories

Debian Bug report logs - #959903 ruby-doorkeeper: CVE-2020-10187 Package: src:ruby-doorkeeper; Maintainer for src:ruby-doorkeeper is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 6 May 2020 19:39:04 UTC Severity: ...