Lucene search

K
osvGoogleOSV:GHSA-RW54-6826-C8J5
HistoryDec 18, 2023 - 7:34 p.m.

yiisoft/yii2-authclient's Oauth2 PKCE implementation is vulnerable

2023-12-1819:34:20
Google
osv.dev
2
oauth2
pkce
vulnerability
impact
patch
upgrade
workaround
downgrade attack
csrf
protection
software

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

26.9%

Impact

What kind of vulnerability is it? Who is impacted?

Original Report:

> The Oauth2 PKCE implementation is vulnerable in 2 ways:
> 1. The authCodeVerifier should be removed after usage (similar to ‘authState’)
> 2. There is a risk for a “downgrade attack” if PKCE is being relied on for CSRF protection.

Patches

Has the problem been patched? What versions should users upgrade to?

2.2.15

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

not known yet.

References

Are there any links users can visit to find out more?

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

26.9%

Related for OSV:GHSA-RW54-6826-C8J5