Lucene search

K
githubGitHub Advisory DatabaseGHSA-VQ59-5X26-H639
HistoryMar 17, 2023 - 2:43 p.m.

Authorization Bypass Through User-Controlled Key play-with-docker

2023-03-1714:43:12
CWE-639
GitHub Advisory Database
github.com
8
authorization bypass
user-controlled key
play-with-docker
cors configuration
http request
response header
security patch
upgrade.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

56.4%

Impact
Give that CORS configuration was not correct, an attacker could use play-with-docker.com as an example, set origin header in http request as evil-play-with-docker.com, it will be echo in response header, which successfully bypass the CORS policy and retrieves basic user information.

Patches
It has been fixed in lastest version, Please upgrade to latest version

Workarounds
No, users have to upgrade version.

Affected configurations

Vulners
Node
play-with-dockerplay_with_dockerRange0.0.2

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

56.4%

Related for GHSA-VQ59-5X26-H639