Lucene search

K
githubGitHub Advisory DatabaseGHSA-H4Q8-96P6-JCGR
HistoryDec 19, 2022 - 10:48 p.m.

ghinstallation returns app JWT in error responses

2022-12-1922:48:32
CWE-209
GitHub Advisory Database
github.com
20
security
ghinstallation
authentication
jwt
token
patch
github
app

5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L

0.0004 Low

EPSS

Percentile

15.7%

Impact

In ghinstallation v1, when the request to refresh an installation token failed, the HTTP request and response would be returned for debugging.

https://github.com/bradleyfalzon/ghinstallation/blob/24e56b3fb7669f209134a01eff731d7e2ef72a5c/transport.go#L172-L174

The request contained the bearer JWT for the App, and was returned back to clients. This token is short lived (10 minute maximum).

Patches

  • This has already been patched in d24f14f8be70d94129d76026e8b0f4f9170c8c3e, and is available in releases >= v2.0.0.

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
bradleyfalzonghinstallationRange<2.0.0

5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L

0.0004 Low

EPSS

Percentile

15.7%

Related for GHSA-H4Q8-96P6-JCGR