Lucene search

K
Doorkeeper ProjectDoorkeeper

6 matches found

CVE
CVE
added 2023/06/12 5:15 p.m.142 views

CVE-2023-34246

Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior to version 5.6.6, Doorkeeper automatically processes authorization requests without user consent for public clients that have been previous approved. Public clients are inherently vulnerable to impersonation, their identity cannot b...

6.5CVSS6.1AI score0.00376EPSS
CVE
CVE
added 2017/01/23 9:59 p.m.69 views

CVE-2016-6582

The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.

9.1CVSS9.1AI score0.01187EPSS
CVE
CVE
added 2018/03/13 3:29 p.m.68 views

CVE-2018-1000088

Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be ex...

6.1CVSS5.8AI score0.00265EPSS
CVE
CVE
added 2020/05/04 2:15 p.m.64 views

CVE-2020-10187

Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their auth...

7.5CVSS7.1AI score0.00425EPSS
CVE
CVE
added 2018/07/13 6:29 p.m.62 views

CVE-2018-1000211

Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.

7.5CVSS7.4AI score0.0028EPSS
CVE
CVE
added 2014/12/31 10:59 p.m.58 views

CVE-2014-8144

Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.

6.8CVSS7.3AI score0.00126EPSS