Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-32312
HistoryJun 09, 2023 - 7:29 p.m.

CVE-2023-32312 Client secret not mandatory in UmbracoIdentityExtensions

2023-06-0919:29:13
CWE-200
GitHub_M
www.cve.org
3
umbracoidentityextensions
client secret
vulnerability
fix
asp.net identity integration
authorization code flow
nuget upgrade
security patch

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

40.3%

UmbracoIdentityExtensions is an Umbraco add-on package that enables easy extensibility points for ASP.Net Identity integration. In affected versions client secrets are not required which may expose some endpoints to untrusted actors. Since Umbraco is not a single-page application, the implicit flow is not safe. For traditional MVC applications, it is recommended to use the authorization code flow, which requires the client to authenticate with the authorization server using a client secret. This flow provides better security, as it involves exchanging an authorization code for an access token and/or ID token, rather than directly returning tokens in the URL fragment. This issue has been patched in commit e792429f9 and a release to Nuget is pending. Users are advised to upgrade when possible.

CNA Affected

[
  {
    "vendor": "umbraco",
    "product": "UmbracoIdentityExtensions",
    "versions": [
      {
        "version": "<= 2.0.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

40.3%

Related for CVELIST:CVE-2023-32312